d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2807.592006][ T9597] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2807.600421][ T9597] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2807.608395][ T9597] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d 23:16:23 executing program 2: socketpair(0xa, 0x5, 0x0, 0x0) [ 2807.616349][ T9597] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2807.624346][ T9597] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2807.632312][ T9597] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2807.640368][ T9597] [ 2807.643421][ T9597] memory: usage 920kB, limit 0kB, failcnt 13404 [ 2807.649876][ T9597] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2807.656896][ T9597] Memory cgroup stats for /syz0: [ 2807.658240][ T9597] anon 36864 [ 2807.658240][ T9597] file 118784 [ 2807.658240][ T9597] kernel 135168 [ 2807.658240][ T9597] kernel_stack 0 [ 2807.658240][ T9597] pagetables 8192 [ 2807.658240][ T9597] percpu 0 [ 2807.658240][ T9597] sock 651264 [ 2807.658240][ T9597] vmalloc 0 [ 2807.658240][ T9597] shmem 118784 [ 2807.658240][ T9597] file_mapped 118784 [ 2807.658240][ T9597] file_dirty 0 [ 2807.658240][ T9597] file_writeback 0 [ 2807.658240][ T9597] swapcached 0 [ 2807.658240][ T9597] inactive_anon 94208 [ 2807.658240][ T9597] active_anon 61440 [ 2807.658240][ T9597] inactive_file 0 [ 2807.658240][ T9597] active_file 0 [ 2807.658240][ T9597] unevictable 0 [ 2807.658240][ T9597] slab_reclaimable 7184 [ 2807.658240][ T9597] slab_unreclaimable 111280 [ 2807.658240][ T9597] slab 118464 [ 2807.658240][ T9597] workingset_refault_anon 0 [ 2807.658240][ T9597] workingset_refault_file 48 [ 2807.658240][ T9597] workingset_activate_anon 0 [ 2807.658240][ T9597] workingset_activate_file 0 [ 2807.752651][ T9597] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=9550,uid=0 [ 2807.768141][ T9597] Memory cgroup out of memory: Killed process 9550 (syz-executor.0) total-vm:42336kB, anon-rss:368kB, file-rss:8192kB, shmem-rss:0kB, UID:0 pgtables:68kB oom_score_adj:0 [ 2807.789249][ T9592] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2807.799564][ T9592] CPU: 1 PID: 9592 Comm: syz-executor.5 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2807.809969][ T9592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2807.820001][ T9592] Call Trace: [ 2807.823319][ T9592] [ 2807.826273][ T9592] dump_stack_lvl+0xd6/0x122 [ 2807.830859][ T9592] dump_stack+0x11/0x12 [ 2807.835093][ T9592] dump_header+0x98/0x410 [ 2807.839495][ T9592] out_of_memory+0x65e/0x880 [ 2807.844069][ T9592] memory_max_write+0x31b/0x420 [ 2807.848904][ T9592] ? memory_max_show+0x70/0x70 [ 2807.853680][ T9592] cgroup_file_write+0x167/0x300 [ 2807.858599][ T9592] ? __check_object_size+0x235/0x380 [ 2807.863896][ T9592] ? cgroup_seqfile_stop+0x70/0x70 [ 2807.868987][ T9592] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2807.874269][ T9592] vfs_write+0x71c/0x890 [ 2807.878558][ T9592] ksys_write+0xe8/0x1a0 [ 2807.882777][ T9592] __x64_sys_write+0x3e/0x50 [ 2807.887345][ T9592] do_syscall_64+0x2b/0x70 [ 2807.891823][ T9592] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2807.897712][ T9592] RIP: 0033:0x7f979ec120e9 [ 2807.902106][ T9592] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2807.921687][ T9592] RSP: 002b:00007f979e388168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2807.930079][ T9592] RAX: ffffffffffffffda RBX: 00007f979ed24f60 RCX: 00007f979ec120e9 [ 2807.938030][ T9592] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2807.945993][ T9592] RBP: 00007f979ec6c08d R08: 0000000000000000 R09: 0000000000000000 [ 2807.954013][ T9592] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2807.961965][ T9592] R13: 00007ffe624163cf R14: 00007f979e388300 R15: 0000000000022000 [ 2807.969922][ T9592] [ 2807.973391][ T9592] memory: usage 868kB, limit 0kB, failcnt 13421 [ 2807.979729][ T9592] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2807.986597][ T9592] Memory cgroup stats for /syz0: [ 2807.987830][ T9592] anon 0 [ 2807.987830][ T9592] file 118784 [ 2807.987830][ T9592] kernel 118784 [ 2807.987830][ T9592] kernel_stack 0 [ 2807.987830][ T9592] pagetables 0 [ 2807.987830][ T9592] percpu 0 [ 2807.987830][ T9592] sock 651264 [ 2807.987830][ T9592] vmalloc 0 [ 2807.987830][ T9592] shmem 118784 [ 2807.987830][ T9592] file_mapped 118784 [ 2807.987830][ T9592] file_dirty 0 [ 2807.987830][ T9592] file_writeback 0 [ 2807.987830][ T9592] swapcached 0 [ 2807.987830][ T9592] inactive_anon 57344 [ 2807.987830][ T9592] active_anon 61440 [ 2807.987830][ T9592] inactive_file 0 [ 2807.987830][ T9592] active_file 0 [ 2807.987830][ T9592] unevictable 0 [ 2807.987830][ T9592] slab_reclaimable 3456 [ 2807.987830][ T9592] slab_unreclaimable 111016 [ 2807.987830][ T9592] slab 114472 [ 2807.987830][ T9592] workingset_refault_anon 0 [ 2807.987830][ T9592] workingset_refault_file 48 [ 2807.987830][ T9592] workingset_activate_anon 0 [ 2807.987830][ T9592] workingset_activate_file 0 [ 2808.081751][ T9592] Out of memory and no killable processes... [ 2808.088601][ T9597] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2808.099121][ T9597] CPU: 0 PID: 9597 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2808.109544][ T9597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2808.119691][ T9597] Call Trace: [ 2808.122995][ T9597] [ 2808.125925][ T9597] dump_stack_lvl+0xd6/0x122 [ 2808.130515][ T9597] dump_stack+0x11/0x12 [ 2808.134661][ T9597] dump_header+0x98/0x410 [ 2808.138973][ T9597] out_of_memory+0x65e/0x880 [ 2808.143611][ T9597] memory_max_write+0x31b/0x420 [ 2808.148505][ T9597] ? memory_max_show+0x70/0x70 [ 2808.153296][ T9597] cgroup_file_write+0x167/0x300 [ 2808.158219][ T9597] ? __check_object_size+0x235/0x380 [ 2808.163535][ T9597] ? cgroup_seqfile_stop+0x70/0x70 [ 2808.168633][ T9597] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2808.173927][ T9597] vfs_write+0x71c/0x890 [ 2808.178175][ T9597] ksys_write+0xe8/0x1a0 [ 2808.182410][ T9597] __x64_sys_write+0x3e/0x50 [ 2808.187004][ T9597] do_syscall_64+0x2b/0x70 [ 2808.191424][ T9597] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2808.197396][ T9597] RIP: 0033:0x7fce18d590e9 [ 2808.201808][ T9597] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2808.221446][ T9597] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2808.229916][ T9597] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2808.237869][ T9597] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2808.245961][ T9597] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2808.253953][ T9597] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2808.261913][ T9597] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2808.269871][ T9597] [ 2808.273020][ T9597] memory: usage 868kB, limit 0kB, failcnt 13421 [ 2808.279351][ T9597] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2808.286191][ T9597] Memory cgroup stats for /syz0: [ 2808.287219][ T9597] anon 0 [ 2808.287219][ T9597] file 118784 [ 2808.287219][ T9597] kernel 118784 [ 2808.287219][ T9597] kernel_stack 0 [ 2808.287219][ T9597] pagetables 0 [ 2808.287219][ T9597] percpu 0 [ 2808.287219][ T9597] sock 651264 [ 2808.287219][ T9597] vmalloc 0 [ 2808.287219][ T9597] shmem 118784 [ 2808.287219][ T9597] file_mapped 118784 [ 2808.287219][ T9597] file_dirty 0 [ 2808.287219][ T9597] file_writeback 0 [ 2808.287219][ T9597] swapcached 0 [ 2808.287219][ T9597] inactive_anon 57344 [ 2808.287219][ T9597] active_anon 61440 [ 2808.287219][ T9597] inactive_file 0 [ 2808.287219][ T9597] active_file 0 [ 2808.287219][ T9597] unevictable 0 [ 2808.287219][ T9597] slab_reclaimable 3456 [ 2808.287219][ T9597] slab_unreclaimable 111016 [ 2808.287219][ T9597] slab 114472 [ 2808.287219][ T9597] workingset_refault_anon 0 [ 2808.287219][ T9597] workingset_refault_file 48 23:16:24 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x531000, 0x0) 23:16:24 executing program 1: socket(0x25, 0x5, 0x6) 23:16:24 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x4400, 0x0) 23:16:24 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0x0, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000015c0)=""/188, 0xbc}], 0x1, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:16:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000001240)) 23:16:24 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0x0, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2808.287219][ T9597] workingset_activate_anon 0 [ 2808.287219][ T9597] workingset_activate_file 0 [ 2808.380803][ T9597] Out of memory and no killable processes... 23:16:24 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x5b2, [], 0x0, 0x0, 0x0}, 0x61c) 23:16:24 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000012c0), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000002600), r0) 23:16:24 executing program 4: socketpair(0x1e, 0x0, 0x1, 0x0) 23:16:24 executing program 1: syz_genetlink_get_family_id$l2tp(&(0x7f0000002600), 0xffffffffffffffff) [ 2808.528455][ T9618] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2808.538664][ T9618] CPU: 0 PID: 9618 Comm: syz-executor.5 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2808.549071][ T9618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2808.559120][ T9618] Call Trace: [ 2808.562392][ T9618] [ 2808.565317][ T9618] dump_stack_lvl+0xd6/0x122 [ 2808.569918][ T9618] dump_stack+0x11/0x12 [ 2808.574151][ T9618] dump_header+0x98/0x410 [ 2808.578514][ T9618] out_of_memory+0x65e/0x880 [ 2808.583145][ T9618] memory_max_write+0x31b/0x420 [ 2808.588006][ T9618] ? memory_max_show+0x70/0x70 [ 2808.592811][ T9618] cgroup_file_write+0x167/0x300 [ 2808.597787][ T9618] ? __check_object_size+0x235/0x380 [ 2808.603072][ T9618] ? cgroup_seqfile_stop+0x70/0x70 [ 2808.608252][ T9618] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2808.613545][ T9618] vfs_write+0x71c/0x890 [ 2808.617793][ T9618] ksys_write+0xe8/0x1a0 [ 2808.622037][ T9618] __x64_sys_write+0x3e/0x50 [ 2808.626629][ T9618] do_syscall_64+0x2b/0x70 [ 2808.631046][ T9618] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2808.636940][ T9618] RIP: 0033:0x7f979ec120e9 [ 2808.641347][ T9618] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2808.660944][ T9618] RSP: 002b:00007f979e388168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2808.669351][ T9618] RAX: ffffffffffffffda RBX: 00007f979ed24f60 RCX: 00007f979ec120e9 [ 2808.677312][ T9618] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2808.685279][ T9618] RBP: 00007f979ec6c08d R08: 0000000000000000 R09: 0000000000000000 [ 2808.693245][ T9618] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2808.701210][ T9618] R13: 00007ffe624163cf R14: 00007f979e388300 R15: 0000000000022000 [ 2808.709225][ T9618] [ 2808.712350][ T9618] memory: usage 864kB, limit 0kB, failcnt 13421 [ 2808.718608][ T9618] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2808.725506][ T9618] Memory cgroup stats for /syz0: [ 2808.738456][ T9618] anon 0 [ 2808.738456][ T9618] file 118784 [ 2808.738456][ T9618] kernel 114688 [ 2808.738456][ T9618] kernel_stack 0 [ 2808.738456][ T9618] pagetables 0 [ 2808.738456][ T9618] percpu 0 [ 2808.738456][ T9618] sock 651264 [ 2808.738456][ T9618] vmalloc 0 [ 2808.738456][ T9618] shmem 118784 [ 2808.738456][ T9618] file_mapped 118784 [ 2808.738456][ T9618] file_dirty 0 [ 2808.738456][ T9618] file_writeback 0 [ 2808.738456][ T9618] swapcached 0 [ 2808.738456][ T9618] inactive_anon 57344 [ 2808.738456][ T9618] active_anon 61440 [ 2808.738456][ T9618] inactive_file 0 [ 2808.738456][ T9618] active_file 0 [ 2808.738456][ T9618] unevictable 0 [ 2808.738456][ T9618] slab_reclaimable 3256 [ 2808.738456][ T9618] slab_unreclaimable 107736 [ 2808.738456][ T9618] slab 110992 [ 2808.738456][ T9618] workingset_refault_anon 0 [ 2808.738456][ T9618] workingset_refault_file 48 [ 2808.738456][ T9618] workingset_activate_anon 0 [ 2808.738456][ T9618] workingset_activate_file 0 [ 2808.831978][ T9618] Out of memory and no killable processes... [ 2808.839881][ T9623] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2808.850205][ T9623] CPU: 0 PID: 9623 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2808.860641][ T9623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2808.870693][ T9623] Call Trace: [ 2808.874002][ T9623] [ 2808.876925][ T9623] dump_stack_lvl+0xd6/0x122 [ 2808.881536][ T9623] dump_stack+0x11/0x12 [ 2808.885759][ T9623] dump_header+0x98/0x410 [ 2808.890087][ T9623] out_of_memory+0x65e/0x880 [ 2808.894676][ T9623] memory_max_write+0x31b/0x420 [ 2808.899598][ T9623] ? memory_max_show+0x70/0x70 [ 2808.904392][ T9623] cgroup_file_write+0x167/0x300 [ 2808.909333][ T9623] ? __check_object_size+0x235/0x380 [ 2808.914618][ T9623] ? cgroup_seqfile_stop+0x70/0x70 [ 2808.919809][ T9623] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2808.925149][ T9623] vfs_write+0x71c/0x890 [ 2808.929397][ T9623] ksys_write+0xe8/0x1a0 [ 2808.933640][ T9623] __x64_sys_write+0x3e/0x50 [ 2808.938341][ T9623] do_syscall_64+0x2b/0x70 [ 2808.942879][ T9623] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2808.948773][ T9623] RIP: 0033:0x7fce18d590e9 [ 2808.953184][ T9623] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2808.972821][ T9623] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2808.981247][ T9623] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2808.989218][ T9623] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2808.997203][ T9623] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2809.005165][ T9623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2809.013191][ T9623] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2809.021157][ T9623] [ 2809.024559][ T9623] memory: usage 864kB, limit 0kB, failcnt 13421 [ 2809.030911][ T9623] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 23:16:24 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r0, 0xa, 0xffffffffffffffff, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000015c0)=""/188, 0xbc}], 0x1, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x12) [ 2809.037921][ T9623] Memory cgroup stats for /syz0: [ 2809.040141][ T9623] anon 0 [ 2809.040141][ T9623] file 118784 [ 2809.040141][ T9623] kernel 114688 [ 2809.040141][ T9623] kernel_stack 0 [ 2809.040141][ T9623] pagetables 0 [ 2809.040141][ T9623] percpu 0 [ 2809.040141][ T9623] sock 651264 [ 2809.040141][ T9623] vmalloc 0 [ 2809.040141][ T9623] shmem 118784 [ 2809.040141][ T9623] file_mapped 118784 [ 2809.040141][ T9623] file_dirty 0 [ 2809.040141][ T9623] file_writeback 0 [ 2809.040141][ T9623] swapcached 0 [ 2809.040141][ T9623] inactive_anon 57344 23:16:25 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0x0, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2809.040141][ T9623] active_anon 61440 [ 2809.040141][ T9623] inactive_file 0 [ 2809.040141][ T9623] active_file 0 [ 2809.040141][ T9623] unevictable 0 [ 2809.040141][ T9623] slab_reclaimable 3256 [ 2809.040141][ T9623] slab_unreclaimable 107736 [ 2809.040141][ T9623] slab 110992 [ 2809.040141][ T9623] workingset_refault_anon 0 [ 2809.040141][ T9623] workingset_refault_file 48 [ 2809.040141][ T9623] workingset_activate_anon 0 [ 2809.040141][ T9623] workingset_activate_file 0 [ 2809.134266][ T9623] Out of memory and no killable processes... 23:16:25 executing program 1: semget(0x3, 0x0, 0x350) 23:16:25 executing program 4: rt_sigaction(0x1a, 0x0, 0x0, 0x8, &(0x7f0000000280)) 23:16:25 executing program 2: r0 = socket$inet(0x2, 0x3, 0x5) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'tunl0\x00', 0x0}) 23:16:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x14}}, 0x0) [ 2809.343104][ T9633] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2809.353560][ T9633] CPU: 0 PID: 9633 Comm: syz-executor.5 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2809.364037][ T9633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2809.374092][ T9633] Call Trace: [ 2809.377375][ T9633] [ 2809.380300][ T9633] dump_stack_lvl+0xd6/0x122 [ 2809.384958][ T9633] dump_stack+0x11/0x12 23:16:25 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f0000000240), 0xffffffffffffffff) 23:16:25 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x18f300, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f00000002c0), 0xffffffffffffffff) [ 2809.389233][ T9633] dump_header+0x98/0x410 [ 2809.393622][ T9633] out_of_memory+0x65e/0x880 [ 2809.398218][ T9633] memory_max_write+0x31b/0x420 [ 2809.403135][ T9633] ? memory_max_show+0x70/0x70 [ 2809.407945][ T9633] cgroup_file_write+0x167/0x300 [ 2809.412959][ T9633] ? cgroup_seqfile_stop+0x70/0x70 [ 2809.418174][ T9633] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2809.423511][ T9633] vfs_write+0x71c/0x890 [ 2809.427845][ T9633] ksys_write+0xe8/0x1a0 [ 2809.432134][ T9633] __x64_sys_write+0x3e/0x50 [ 2809.436792][ T9633] do_syscall_64+0x2b/0x70 [ 2809.441209][ T9633] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2809.447107][ T9633] RIP: 0033:0x7f979ec120e9 [ 2809.451545][ T9633] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2809.471205][ T9633] RSP: 002b:00007f979e388168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2809.479618][ T9633] RAX: ffffffffffffffda RBX: 00007f979ed24f60 RCX: 00007f979ec120e9 [ 2809.487587][ T9633] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2809.495685][ T9633] RBP: 00007f979ec6c08d R08: 0000000000000000 R09: 0000000000000000 [ 2809.503664][ T9633] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2809.511663][ T9633] R13: 00007ffe624163cf R14: 00007f979e388300 R15: 0000000000022000 [ 2809.519642][ T9633] [ 2809.522682][ T9633] memory: usage 864kB, limit 0kB, failcnt 13421 [ 2809.529017][ T9633] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2809.535997][ T9633] Memory cgroup stats for /syz0: [ 2809.538833][ T9633] anon 0 [ 2809.538833][ T9633] file 118784 [ 2809.538833][ T9633] kernel 114688 [ 2809.538833][ T9633] kernel_stack 0 [ 2809.538833][ T9633] pagetables 0 [ 2809.538833][ T9633] percpu 0 [ 2809.538833][ T9633] sock 651264 [ 2809.538833][ T9633] vmalloc 0 [ 2809.538833][ T9633] shmem 118784 [ 2809.538833][ T9633] file_mapped 118784 [ 2809.538833][ T9633] file_dirty 0 [ 2809.538833][ T9633] file_writeback 0 [ 2809.538833][ T9633] swapcached 0 [ 2809.538833][ T9633] inactive_anon 57344 [ 2809.538833][ T9633] active_anon 61440 [ 2809.538833][ T9633] inactive_file 0 [ 2809.538833][ T9633] active_file 0 [ 2809.538833][ T9633] unevictable 0 [ 2809.538833][ T9633] slab_reclaimable 3256 [ 2809.538833][ T9633] slab_unreclaimable 107736 [ 2809.538833][ T9633] slab 110992 [ 2809.538833][ T9633] workingset_refault_anon 0 [ 2809.538833][ T9633] workingset_refault_file 48 [ 2809.538833][ T9633] workingset_activate_anon 0 [ 2809.538833][ T9633] workingset_activate_file 0 [ 2809.632584][ T9633] Out of memory and no killable processes... [ 2809.640681][ T9641] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2809.650996][ T9641] CPU: 1 PID: 9641 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2809.661431][ T9641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2809.671468][ T9641] Call Trace: [ 2809.674724][ T9641] [ 2809.677629][ T9641] dump_stack_lvl+0xd6/0x122 [ 2809.682257][ T9641] dump_stack+0x11/0x12 [ 2809.686425][ T9641] dump_header+0x98/0x410 [ 2809.690859][ T9641] out_of_memory+0x65e/0x880 [ 2809.695448][ T9641] memory_max_write+0x31b/0x420 [ 2809.700301][ T9641] ? memory_max_show+0x70/0x70 [ 2809.705062][ T9641] cgroup_file_write+0x167/0x300 [ 2809.710051][ T9641] ? __check_object_size+0x235/0x380 [ 2809.715312][ T9641] ? cgroup_seqfile_stop+0x70/0x70 [ 2809.720403][ T9641] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2809.725716][ T9641] vfs_write+0x71c/0x890 [ 2809.729958][ T9641] ksys_write+0xe8/0x1a0 [ 2809.734212][ T9641] __x64_sys_write+0x3e/0x50 [ 2809.738837][ T9641] do_syscall_64+0x2b/0x70 [ 2809.743358][ T9641] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2809.749227][ T9641] RIP: 0033:0x7fce18d590e9 [ 2809.753673][ T9641] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2809.773351][ T9641] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2809.781752][ T9641] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2809.789700][ T9641] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2809.797645][ T9641] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2809.805752][ T9641] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2809.813711][ T9641] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2809.821739][ T9641] [ 2809.824779][ T9641] memory: usage 864kB, limit 0kB, failcnt 13421 [ 2809.831160][ T9641] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2809.838020][ T9641] Memory cgroup stats for /syz0: [ 2809.840399][ T9641] anon 0 [ 2809.840399][ T9641] file 118784 [ 2809.840399][ T9641] kernel 114688 [ 2809.840399][ T9641] kernel_stack 0 [ 2809.840399][ T9641] pagetables 0 [ 2809.840399][ T9641] percpu 0 [ 2809.840399][ T9641] sock 651264 [ 2809.840399][ T9641] vmalloc 0 [ 2809.840399][ T9641] shmem 118784 [ 2809.840399][ T9641] file_mapped 118784 [ 2809.840399][ T9641] file_dirty 0 [ 2809.840399][ T9641] file_writeback 0 [ 2809.840399][ T9641] swapcached 0 [ 2809.840399][ T9641] inactive_anon 57344 [ 2809.840399][ T9641] active_anon 61440 [ 2809.840399][ T9641] inactive_file 0 [ 2809.840399][ T9641] active_file 0 [ 2809.840399][ T9641] unevictable 0 [ 2809.840399][ T9641] slab_reclaimable 3256 [ 2809.840399][ T9641] slab_unreclaimable 107736 [ 2809.840399][ T9641] slab 110992 [ 2809.840399][ T9641] workingset_refault_anon 0 [ 2809.840399][ T9641] workingset_refault_file 48 [ 2809.840399][ T9641] workingset_activate_anon 0 [ 2809.840399][ T9641] workingset_activate_file 0 [ 2809.934788][ T9641] Out of memory and no killable processes... [ 2810.070447][T20545] device hsr_slave_0 left promiscuous mode [ 2810.076744][T20545] device hsr_slave_1 left promiscuous mode [ 2810.083050][T20545] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2810.090460][T20545] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2810.100205][T20545] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2810.107643][T20545] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2810.117269][T20545] device bridge_slave_1 left promiscuous mode [ 2810.123381][T20545] bridge0: port 2(bridge_slave_1) entered disabled state [ 2810.131464][T20545] device bridge_slave_0 left promiscuous mode [ 2810.137685][T20545] bridge0: port 1(bridge_slave_0) entered disabled state [ 2810.151444][T20545] device veth1_macvtap left promiscuous mode [ 2810.157458][T20545] device veth0_macvtap left promiscuous mode [ 2810.163496][T20545] device veth1_vlan left promiscuous mode [ 2810.169306][T20545] device veth0_vlan left promiscuous mode [ 2810.260970][T20545] team0 (unregistering): Port device team_slave_1 removed [ 2810.271564][T20545] team0 (unregistering): Port device team_slave_0 removed [ 2810.281568][T20545] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2810.292979][T20545] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2810.321981][T20545] bond0 (unregistering): Released all slaves [ 2810.427036][ T9654] chnl_net:caif_netlink_parms(): no params data found [ 2810.456046][ T9654] bridge0: port 1(bridge_slave_0) entered blocking state [ 2810.463181][ T9654] bridge0: port 1(bridge_slave_0) entered disabled state [ 2810.471053][ T9654] device bridge_slave_0 entered promiscuous mode [ 2810.478275][ T9654] bridge0: port 2(bridge_slave_1) entered blocking state [ 2810.485341][ T9654] bridge0: port 2(bridge_slave_1) entered disabled state [ 2810.493039][ T9654] device bridge_slave_1 entered promiscuous mode [ 2810.508423][ T9654] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2810.518665][ T9654] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2810.535550][ T9654] team0: Port device team_slave_0 added [ 2810.542018][ T9654] team0: Port device team_slave_1 added [ 2810.555964][ T9654] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2810.562898][ T9654] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2810.588963][ T9654] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2810.600685][ T9654] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2810.607650][ T9654] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2810.633577][ T9654] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2810.655601][ T9654] device hsr_slave_0 entered promiscuous mode [ 2810.662017][ T9654] device hsr_slave_1 entered promiscuous mode [ 2810.668603][ T9654] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2810.677057][ T9654] Cannot create hsr debugfs directory [ 2810.711165][ T9654] bridge0: port 2(bridge_slave_1) entered blocking state [ 2810.718206][ T9654] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2810.725471][ T9654] bridge0: port 1(bridge_slave_0) entered blocking state [ 2810.732472][ T9654] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2810.759880][ T9654] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2810.769929][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2810.778058][T10079] bridge0: port 1(bridge_slave_0) entered disabled state [ 2810.785813][T10079] bridge0: port 2(bridge_slave_1) entered disabled state [ 2810.797327][ T9654] 8021q: adding VLAN 0 to HW filter on device team0 [ 2810.806955][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2810.815362][T18607] bridge0: port 1(bridge_slave_0) entered blocking state [ 2810.822428][T18607] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2810.831992][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2810.840355][ T6136] bridge0: port 2(bridge_slave_1) entered blocking state [ 2810.847385][ T6136] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2810.861224][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2810.869677][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2810.884134][ T9654] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2810.894502][ T9654] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2810.907402][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2810.916234][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2810.924493][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2810.932809][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2810.945483][ T9654] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2810.952686][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2810.961827][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2811.029924][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2811.074494][ T9654] device veth0_vlan entered promiscuous mode [ 2811.081375][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2811.090070][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2811.097845][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2811.107856][ T9654] device veth1_vlan entered promiscuous mode [ 2811.120454][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2811.128296][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2811.138034][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2811.147632][ T9654] device veth0_macvtap entered promiscuous mode [ 2811.155210][ T9654] device veth1_macvtap entered promiscuous mode [ 2811.165955][ T9654] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2811.176396][ T9654] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2811.186268][ T9654] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2811.196712][ T9654] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2811.206548][ T9654] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2811.216949][ T9654] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2811.226772][ T9654] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2811.237246][ T9654] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2811.247198][ T9654] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2811.257600][ T9654] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2811.267422][ T9654] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2811.277823][ T9654] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2811.289538][ T9654] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2811.297329][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2811.307778][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2811.317026][ T9654] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2811.327455][ T9654] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2811.337279][ T9654] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2811.347721][ T9654] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2811.357511][ T9654] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2811.367918][ T9654] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2811.377714][ T9654] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2811.388172][ T9654] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2811.398026][ T9654] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2811.408428][ T9654] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 23:16:27 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x1, 0x0, 0x0) 23:16:27 executing program 1: sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, 0x0, 0x0) 23:16:27 executing program 2: timer_create(0x2, 0x0, &(0x7f0000000340)) timer_gettime(0x0, &(0x7f0000000380)) 23:16:27 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet6(r0, &(0x7f0000004e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002340)=[@pktinfo={{0x24, 0x29, 0x32, {@empty}}}], 0x28}}], 0x1, 0x0) 23:16:27 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r0, 0xa, 0xffffffffffffffff, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000015c0)=""/188, 0xbc}], 0x1, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x12) 23:16:27 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0x0, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2811.418243][ T9654] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2811.428638][ T9654] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2811.441054][ T9654] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2811.449452][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 23:16:27 executing program 2: setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) 23:16:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000e80)=@broute={'broute\x00', 0x20, 0x5, 0x146, [], 0x0, 0x0, &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{0x0, 0x0, 0x0, 'veth0_to_bridge\x00', 'vxcan1\x00', 'wg2\x00', 'bridge_slave_1\x00', @remote, [], @broadcast, [], 0x6e, 0x6e, 0xb6, [], [], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x1be) 23:16:27 executing program 4: unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs/binder1\x00') [ 2811.558564][ T9654] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2811.568561][ T9654] CPU: 1 PID: 9654 Comm: syz-executor.0 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2811.578967][ T9654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2811.589014][ T9654] Call Trace: [ 2811.592270][ T9654] [ 2811.595177][ T9654] dump_stack_lvl+0xd6/0x122 [ 2811.599837][ T9654] dump_stack+0x11/0x12 [ 2811.604024][ T9654] dump_header+0x98/0x410 [ 2811.608352][ T9654] oom_kill_process+0xfe/0x550 [ 2811.613170][ T9654] out_of_memory+0x620/0x880 [ 2811.617805][ T9654] mem_cgroup_oom+0x475/0x4f0 [ 2811.622471][ T9654] try_charge_memcg+0x746/0x960 [ 2811.627347][ T9654] ? __filemap_get_folio+0x57c/0x680 [ 2811.632641][ T9654] obj_cgroup_charge+0x171/0x2b0 [ 2811.637559][ T9654] memcg_slab_pre_alloc_hook+0xf7/0x170 [ 2811.643132][ T9654] ? __d_alloc+0x3d/0x380 [ 2811.647437][ T9654] kmem_cache_alloc_lru+0x76/0x2b0 [ 2811.652524][ T9654] __d_alloc+0x3d/0x380 [ 2811.656654][ T9654] d_alloc_parallel+0x51/0xcc0 [ 2811.661439][ T9654] ? selinux_inode_permission+0x2d8/0x400 [ 2811.667135][ T9654] ? selinux_inode_permission+0x335/0x400 [ 2811.672898][ T9654] ? lockref_get_not_dead+0xeb/0x190 [ 2811.678159][ T9654] ? __rcu_read_unlock+0x4a/0x70 [ 2811.683076][ T9654] ? __down_read_common+0x16c/0x4c0 [ 2811.688289][ T9654] __lookup_slow+0x80/0x250 [ 2811.692810][ T9654] lookup_slow+0x3c/0x60 [ 2811.697029][ T9654] walk_component+0x23d/0x280 [ 2811.701685][ T9654] path_lookupat+0x11d/0x2b0 [ 2811.706313][ T9654] filename_lookup+0x130/0x310 [ 2811.711079][ T9654] user_path_at_empty+0x3e/0x110 [ 2811.715990][ T9654] __x64_sys_umount+0x84/0xe0 [ 2811.720639][ T9654] do_syscall_64+0x2b/0x70 [ 2811.725051][ T9654] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2811.730965][ T9654] RIP: 0033:0x7fe88ae54557 [ 2811.735358][ T9654] Code: ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2811.754955][ T9654] RSP: 002b:00007ffd52fe1208 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 2811.763347][ T9654] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fe88ae54557 [ 2811.771378][ T9654] RDX: 00007ffd52fe12de RSI: 000000000000000a RDI: 00007ffd52fe12d0 [ 2811.779327][ T9654] RBP: 00007ffd52fe12d0 R08: 00000000ffffffff R09: 00007ffd52fe10a0 [ 2811.787275][ T9654] R10: 00005555572bd7c3 R11: 0000000000000246 R12: 00007fe88aeac1f8 [ 2811.795290][ T9654] R13: 00007ffd52fe2390 R14: 00005555572bd6f0 R15: 00007ffd52fe23d0 [ 2811.803293][ T9654] 23:16:27 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r0, 0xa, 0xffffffffffffffff, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000015c0)=""/188, 0xbc}], 0x1, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x12) [ 2811.806473][ T9654] memory: usage 924kB, limit 0kB, failcnt 13440 [ 2811.812751][ T9654] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2811.819591][ T9654] Memory cgroup stats for /syz0: [ 2811.819882][ T9654] anon 36864 [ 2811.819882][ T9654] file 118784 [ 2811.819882][ T9654] kernel 139264 [ 2811.819882][ T9654] kernel_stack 0 [ 2811.819882][ T9654] pagetables 8192 [ 2811.819882][ T9654] percpu 0 [ 2811.819882][ T9654] sock 651264 [ 2811.819882][ T9654] vmalloc 0 [ 2811.819882][ T9654] shmem 118784 [ 2811.819882][ T9654] file_mapped 118784 [ 2811.819882][ T9654] file_dirty 0 [ 2811.819882][ T9654] file_writeback 0 [ 2811.819882][ T9654] swapcached 0 [ 2811.819882][ T9654] inactive_anon 94208 [ 2811.819882][ T9654] active_anon 61440 [ 2811.819882][ T9654] inactive_file 0 [ 2811.819882][ T9654] active_file 0 [ 2811.819882][ T9654] unevictable 0 [ 2811.819882][ T9654] slab_reclaimable 8960 [ 2811.819882][ T9654] slab_unreclaimable 111280 [ 2811.819882][ T9654] slab 120240 [ 2811.819882][ T9654] workingset_refault_anon 0 [ 2811.819882][ T9654] workingset_refault_file 48 [ 2811.819882][ T9654] workingset_activate_anon 0 [ 2811.819882][ T9654] workingset_activate_file 0 [ 2811.915021][ T9654] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=9654,uid=0 [ 2811.930246][ T9654] Memory cgroup out of memory: Killed process 9654 (syz-executor.0) total-vm:42336kB, anon-rss:364kB, file-rss:8192kB, shmem-rss:0kB, UID:0 pgtables:68kB oom_score_adj:0 [ 2811.964834][ T9697] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2811.975630][ T9697] CPU: 0 PID: 9697 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2811.986042][ T9697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2811.996089][ T9697] Call Trace: [ 2811.999453][ T9697] [ 2812.002375][ T9697] dump_stack_lvl+0xd6/0x122 [ 2812.007045][ T9697] dump_stack+0x11/0x12 23:16:27 executing program 1: socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) 23:16:27 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) [ 2812.011239][ T9697] dump_header+0x98/0x410 [ 2812.015617][ T9697] out_of_memory+0x65e/0x880 [ 2812.020207][ T9697] memory_max_write+0x31b/0x420 [ 2812.025123][ T9697] ? memory_max_show+0x70/0x70 [ 2812.029908][ T9697] cgroup_file_write+0x167/0x300 [ 2812.034853][ T9697] ? __check_object_size+0x235/0x380 [ 2812.040164][ T9697] ? cgroup_seqfile_stop+0x70/0x70 [ 2812.045277][ T9697] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2812.050637][ T9697] vfs_write+0x71c/0x890 [ 2812.054886][ T9697] ksys_write+0xe8/0x1a0 [ 2812.059126][ T9697] __x64_sys_write+0x3e/0x50 [ 2812.063698][ T9697] do_syscall_64+0x2b/0x70 [ 2812.068112][ T9697] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2812.073988][ T9697] RIP: 0033:0x7fce18d590e9 [ 2812.078398][ T9697] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2812.098016][ T9697] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2812.106430][ T9697] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2812.114401][ T9697] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2812.122372][ T9697] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2812.130342][ T9697] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2812.138309][ T9697] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2812.146279][ T9697] [ 2812.149324][ T9697] memory: usage 872kB, limit 0kB, failcnt 13457 [ 2812.155645][ T9697] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2812.162658][ T9697] Memory cgroup stats for /syz0: [ 2812.164137][ T9697] anon 0 [ 2812.164137][ T9697] file 118784 [ 2812.164137][ T9697] kernel 122880 [ 2812.164137][ T9697] kernel_stack 0 [ 2812.164137][ T9697] pagetables 0 [ 2812.164137][ T9697] percpu 0 [ 2812.164137][ T9697] sock 651264 [ 2812.164137][ T9697] vmalloc 0 [ 2812.164137][ T9697] shmem 118784 [ 2812.164137][ T9697] file_mapped 118784 [ 2812.164137][ T9697] file_dirty 0 [ 2812.164137][ T9697] file_writeback 0 [ 2812.164137][ T9697] swapcached 0 [ 2812.164137][ T9697] inactive_anon 57344 [ 2812.164137][ T9697] active_anon 61440 [ 2812.164137][ T9697] inactive_file 0 [ 2812.164137][ T9697] active_file 0 [ 2812.164137][ T9697] unevictable 0 [ 2812.164137][ T9697] slab_reclaimable 4632 [ 2812.164137][ T9697] slab_unreclaimable 111280 [ 2812.164137][ T9697] slab 115912 [ 2812.164137][ T9697] workingset_refault_anon 0 [ 2812.164137][ T9697] workingset_refault_file 48 [ 2812.164137][ T9697] workingset_activate_anon 0 [ 2812.164137][ T9697] workingset_activate_file 0 [ 2812.258086][ T9697] Out of memory and no killable processes... [ 2812.264329][ T9711] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2812.274762][ T9711] CPU: 0 PID: 9711 Comm: syz-executor.5 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2812.285242][ T9711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2812.295291][ T9711] Call Trace: [ 2812.298550][ T9711] [ 2812.301458][ T9711] dump_stack_lvl+0xd6/0x122 [ 2812.306117][ T9711] dump_stack+0x11/0x12 [ 2812.310277][ T9711] dump_header+0x98/0x410 [ 2812.314598][ T9711] out_of_memory+0x65e/0x880 [ 2812.319173][ T9711] memory_max_write+0x31b/0x420 [ 2812.324087][ T9711] ? memory_max_show+0x70/0x70 [ 2812.328896][ T9711] cgroup_file_write+0x167/0x300 [ 2812.333816][ T9711] ? __check_object_size+0x235/0x380 [ 2812.339187][ T9711] ? cgroup_seqfile_stop+0x70/0x70 [ 2812.344354][ T9711] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2812.349622][ T9711] vfs_write+0x71c/0x890 [ 2812.353847][ T9711] ksys_write+0xe8/0x1a0 [ 2812.358066][ T9711] __x64_sys_write+0x3e/0x50 [ 2812.362725][ T9711] do_syscall_64+0x2b/0x70 [ 2812.367121][ T9711] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2812.373016][ T9711] RIP: 0033:0x7f979ec120e9 [ 2812.377420][ T9711] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2812.397037][ T9711] RSP: 002b:00007f979e388168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2812.405425][ T9711] RAX: ffffffffffffffda RBX: 00007f979ed24f60 RCX: 00007f979ec120e9 [ 2812.413428][ T9711] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2812.421378][ T9711] RBP: 00007f979ec6c08d R08: 0000000000000000 R09: 0000000000000000 [ 2812.429334][ T9711] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2812.437303][ T9711] R13: 00007ffe624163cf R14: 00007f979e388300 R15: 0000000000022000 [ 2812.445270][ T9711] [ 2812.448759][ T9711] memory: usage 872kB, limit 0kB, failcnt 13457 [ 2812.455089][ T9711] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2812.461986][ T9711] Memory cgroup stats for /syz0: [ 2812.463454][ T9711] anon 0 [ 2812.463454][ T9711] file 118784 [ 2812.463454][ T9711] kernel 122880 [ 2812.463454][ T9711] kernel_stack 0 [ 2812.463454][ T9711] pagetables 0 [ 2812.463454][ T9711] percpu 0 [ 2812.463454][ T9711] sock 651264 [ 2812.463454][ T9711] vmalloc 0 [ 2812.463454][ T9711] shmem 118784 [ 2812.463454][ T9711] file_mapped 118784 [ 2812.463454][ T9711] file_dirty 0 [ 2812.463454][ T9711] file_writeback 0 [ 2812.463454][ T9711] swapcached 0 [ 2812.463454][ T9711] inactive_anon 57344 23:16:28 executing program 0: r0 = socket$inet(0x2, 0x3, 0x5) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'tunl0\x00', &(0x7f0000000200)=ANY=[]}) 23:16:28 executing program 4: socket$inet(0x2, 0x0, 0xd825) 23:16:28 executing program 2: syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) getresuid(&(0x7f0000000100), &(0x7f0000000240), 0x0) 23:16:28 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0x0, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:16:28 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000015c0)=""/188, 0xbc}], 0x1, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:16:28 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) [ 2812.463454][ T9711] active_anon 61440 [ 2812.463454][ T9711] inactive_file 0 [ 2812.463454][ T9711] active_file 0 [ 2812.463454][ T9711] unevictable 0 [ 2812.463454][ T9711] slab_reclaimable 4632 [ 2812.463454][ T9711] slab_unreclaimable 111280 [ 2812.463454][ T9711] slab 115912 [ 2812.463454][ T9711] workingset_refault_anon 0 [ 2812.463454][ T9711] workingset_refault_file 48 [ 2812.463454][ T9711] workingset_activate_anon 0 [ 2812.463454][ T9711] workingset_activate_file 0 [ 2812.557274][ T9711] Out of memory and no killable processes... 23:16:28 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @empty, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x50}, {@loopback}}, 0x44) 23:16:28 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0xe) 23:16:28 executing program 1: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x81000) 23:16:28 executing program 2: socketpair(0x9, 0x0, 0x0, 0x0) [ 2812.668151][ T9726] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2812.678855][ T9726] CPU: 1 PID: 9726 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2812.689278][ T9726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2812.699382][ T9726] Call Trace: [ 2812.702720][ T9726] [ 2812.705631][ T9726] dump_stack_lvl+0xd6/0x122 [ 2812.710202][ T9726] dump_stack+0x11/0x12 [ 2812.714352][ T9726] dump_header+0x98/0x410 [ 2812.718705][ T9726] out_of_memory+0x65e/0x880 [ 2812.723276][ T9726] memory_max_write+0x31b/0x420 [ 2812.728179][ T9726] ? memory_max_show+0x70/0x70 [ 2812.732923][ T9726] cgroup_file_write+0x167/0x300 [ 2812.737857][ T9726] ? __check_object_size+0x235/0x380 [ 2812.743145][ T9726] ? cgroup_seqfile_stop+0x70/0x70 [ 2812.748284][ T9726] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2812.753554][ T9726] vfs_write+0x71c/0x890 [ 2812.757779][ T9726] ksys_write+0xe8/0x1a0 [ 2812.762002][ T9726] __x64_sys_write+0x3e/0x50 [ 2812.766580][ T9726] do_syscall_64+0x2b/0x70 [ 2812.771058][ T9726] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2812.777073][ T9726] RIP: 0033:0x7fce18d590e9 [ 2812.781477][ T9726] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2812.801060][ T9726] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2812.809531][ T9726] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2812.817487][ T9726] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2812.825452][ T9726] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2812.833416][ T9726] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2812.841362][ T9726] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2812.849369][ T9726] [ 2812.852415][ T9726] memory: usage 868kB, limit 0kB, failcnt 13457 [ 2812.858677][ T9726] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2812.865589][ T9726] Memory cgroup stats for /syz0: [ 2812.866501][ T9726] anon 0 [ 2812.866501][ T9726] file 118784 [ 2812.866501][ T9726] kernel 118784 [ 2812.866501][ T9726] kernel_stack 0 [ 2812.866501][ T9726] pagetables 0 [ 2812.866501][ T9726] percpu 0 [ 2812.866501][ T9726] sock 651264 [ 2812.866501][ T9726] vmalloc 0 [ 2812.866501][ T9726] shmem 118784 [ 2812.866501][ T9726] file_mapped 118784 [ 2812.866501][ T9726] file_dirty 0 [ 2812.866501][ T9726] file_writeback 0 [ 2812.866501][ T9726] swapcached 0 [ 2812.866501][ T9726] inactive_anon 57344 [ 2812.866501][ T9726] active_anon 61440 [ 2812.866501][ T9726] inactive_file 0 [ 2812.866501][ T9726] active_file 0 [ 2812.866501][ T9726] unevictable 0 [ 2812.866501][ T9726] slab_reclaimable 4632 [ 2812.866501][ T9726] slab_unreclaimable 107736 [ 2812.866501][ T9726] slab 112368 [ 2812.866501][ T9726] workingset_refault_anon 0 [ 2812.866501][ T9726] workingset_refault_file 48 [ 2812.866501][ T9726] workingset_activate_anon 0 [ 2812.866501][ T9726] workingset_activate_file 0 [ 2812.960414][ T9726] Out of memory and no killable processes... [ 2812.968353][ T9730] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2812.978732][ T9730] CPU: 0 PID: 9730 Comm: syz-executor.5 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2812.989142][ T9730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2812.999191][ T9730] Call Trace: [ 2813.002475][ T9730] [ 2813.005398][ T9730] dump_stack_lvl+0xd6/0x122 [ 2813.010064][ T9730] dump_stack+0x11/0x12 [ 2813.014228][ T9730] dump_header+0x98/0x410 [ 2813.018558][ T9730] out_of_memory+0x65e/0x880 [ 2813.023154][ T9730] memory_max_write+0x31b/0x420 [ 2813.028012][ T9730] ? memory_max_show+0x70/0x70 [ 2813.032784][ T9730] cgroup_file_write+0x167/0x300 [ 2813.037723][ T9730] ? __check_object_size+0x235/0x380 [ 2813.043080][ T9730] ? cgroup_seqfile_stop+0x70/0x70 [ 2813.048202][ T9730] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2813.053499][ T9730] vfs_write+0x71c/0x890 [ 2813.057790][ T9730] ksys_write+0xe8/0x1a0 [ 2813.062044][ T9730] __x64_sys_write+0x3e/0x50 23:16:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x4000, 0x0, 0x0) 23:16:28 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x207c0, 0x0) [ 2813.066707][ T9730] do_syscall_64+0x2b/0x70 [ 2813.071181][ T9730] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2813.077096][ T9730] RIP: 0033:0x7f979ec120e9 [ 2813.081505][ T9730] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2813.101204][ T9730] RSP: 002b:00007f979e367168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2813.109616][ T9730] RAX: ffffffffffffffda RBX: 00007f979ed25030 RCX: 00007f979ec120e9 23:16:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000740)={0x2, 0x0, @multicast1}, 0xfffffffffffffd3f) [ 2813.117593][ T9730] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2813.126119][ T9730] RBP: 00007f979ec6c08d R08: 0000000000000000 R09: 0000000000000000 [ 2813.134154][ T9730] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2813.142123][ T9730] R13: 00007ffe624163cf R14: 00007f979e367300 R15: 0000000000022000 [ 2813.150098][ T9730] [ 2813.153145][ T9730] memory: usage 864kB, limit 0kB, failcnt 13457 [ 2813.159403][ T9730] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 23:16:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f00000000c0)={@broadcast, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) [ 2813.166273][ T9730] Memory cgroup stats for /syz0: [ 2813.175739][ T9730] anon 0 [ 2813.175739][ T9730] file 118784 [ 2813.175739][ T9730] kernel 114688 [ 2813.175739][ T9730] kernel_stack 0 [ 2813.175739][ T9730] pagetables 0 [ 2813.175739][ T9730] percpu 0 [ 2813.175739][ T9730] sock 651264 [ 2813.175739][ T9730] vmalloc 0 [ 2813.175739][ T9730] shmem 118784 [ 2813.175739][ T9730] file_mapped 118784 [ 2813.175739][ T9730] file_dirty 0 [ 2813.175739][ T9730] file_writeback 0 [ 2813.175739][ T9730] swapcached 0 [ 2813.175739][ T9730] inactive_anon 57344 23:16:29 executing program 1: socketpair(0x15, 0x0, 0x0, 0x0) [ 2813.175739][ T9730] active_anon 61440 [ 2813.175739][ T9730] inactive_file 0 [ 2813.175739][ T9730] active_file 0 [ 2813.175739][ T9730] unevictable 0 [ 2813.175739][ T9730] slab_reclaimable 3256 [ 2813.175739][ T9730] slab_unreclaimable 107736 [ 2813.175739][ T9730] slab 110992 [ 2813.175739][ T9730] workingset_refault_anon 0 [ 2813.175739][ T9730] workingset_refault_file 48 [ 2813.175739][ T9730] workingset_activate_anon 0 [ 2813.175739][ T9730] workingset_activate_file 0 [ 2813.269217][ T9730] Out of memory and no killable processes... 23:16:29 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0x0, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:16:29 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000015c0)=""/188, 0xbc}], 0x1, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:16:29 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@mcast1, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xf0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@private}, 0x0, @in=@remote}}, 0xe8) [ 2813.473681][ T9751] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2813.484239][ T9751] CPU: 0 PID: 9751 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2813.494699][ T9751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2813.504844][ T9751] Call Trace: [ 2813.508134][ T9751] [ 2813.511063][ T9751] dump_stack_lvl+0xd6/0x122 [ 2813.515738][ T9751] dump_stack+0x11/0x12 [ 2813.519901][ T9751] dump_header+0x98/0x410 [ 2813.524269][ T9751] out_of_memory+0x65e/0x880 [ 2813.528872][ T9751] memory_max_write+0x31b/0x420 [ 2813.533803][ T9751] ? memory_max_show+0x70/0x70 [ 2813.538620][ T9751] cgroup_file_write+0x167/0x300 [ 2813.543695][ T9751] ? __check_object_size+0x235/0x380 [ 2813.548978][ T9751] ? cgroup_seqfile_stop+0x70/0x70 [ 2813.554104][ T9751] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2813.559401][ T9751] vfs_write+0x71c/0x890 [ 2813.563652][ T9751] ksys_write+0xe8/0x1a0 [ 2813.567901][ T9751] __x64_sys_write+0x3e/0x50 [ 2813.572571][ T9751] do_syscall_64+0x2b/0x70 [ 2813.577050][ T9751] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2813.583023][ T9751] RIP: 0033:0x7fce18d590e9 [ 2813.587428][ T9751] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2813.607087][ T9751] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2813.615569][ T9751] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2813.623516][ T9751] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2813.631497][ T9751] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2813.639448][ T9751] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2813.647456][ T9751] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2813.655412][ T9751] [ 2813.658501][ T9751] memory: usage 864kB, limit 0kB, failcnt 13457 [ 2813.664772][ T9751] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2813.671704][ T9751] Memory cgroup stats for /syz0: [ 2813.673288][ T9751] anon 0 [ 2813.673288][ T9751] file 118784 [ 2813.673288][ T9751] kernel 114688 [ 2813.673288][ T9751] kernel_stack 0 [ 2813.673288][ T9751] pagetables 0 [ 2813.673288][ T9751] percpu 0 [ 2813.673288][ T9751] sock 651264 [ 2813.673288][ T9751] vmalloc 0 [ 2813.673288][ T9751] shmem 118784 [ 2813.673288][ T9751] file_mapped 118784 [ 2813.673288][ T9751] file_dirty 0 [ 2813.673288][ T9751] file_writeback 0 [ 2813.673288][ T9751] swapcached 0 [ 2813.673288][ T9751] inactive_anon 57344 [ 2813.673288][ T9751] active_anon 61440 [ 2813.673288][ T9751] inactive_file 0 [ 2813.673288][ T9751] active_file 0 [ 2813.673288][ T9751] unevictable 0 [ 2813.673288][ T9751] slab_reclaimable 3256 [ 2813.673288][ T9751] slab_unreclaimable 107736 [ 2813.673288][ T9751] slab 110992 [ 2813.673288][ T9751] workingset_refault_anon 0 [ 2813.673288][ T9751] workingset_refault_file 48 [ 2813.673288][ T9751] workingset_activate_anon 0 [ 2813.673288][ T9751] workingset_activate_file 0 [ 2813.767398][ T9751] Out of memory and no killable processes... [ 2813.774292][ T9752] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2813.784756][ T9752] CPU: 0 PID: 9752 Comm: syz-executor.5 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2813.795194][ T9752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2813.805292][ T9752] Call Trace: [ 2813.808573][ T9752] [ 2813.811491][ T9752] dump_stack_lvl+0xd6/0x122 [ 2813.816141][ T9752] dump_stack+0x11/0x12 [ 2813.820271][ T9752] dump_header+0x98/0x410 [ 2813.824626][ T9752] out_of_memory+0x65e/0x880 [ 2813.829239][ T9752] memory_max_write+0x31b/0x420 [ 2813.834070][ T9752] ? memory_max_show+0x70/0x70 [ 2813.838811][ T9752] cgroup_file_write+0x167/0x300 [ 2813.843801][ T9752] ? __check_object_size+0x235/0x380 [ 2813.849184][ T9752] ? cgroup_seqfile_stop+0x70/0x70 [ 2813.854286][ T9752] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2813.859649][ T9752] vfs_write+0x71c/0x890 [ 2813.863889][ T9752] ksys_write+0xe8/0x1a0 [ 2813.868126][ T9752] __x64_sys_write+0x3e/0x50 [ 2813.872706][ T9752] do_syscall_64+0x2b/0x70 [ 2813.877110][ T9752] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2813.882980][ T9752] RIP: 0033:0x7f979ec120e9 [ 2813.887371][ T9752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2813.906965][ T9752] RSP: 002b:00007f979e388168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2813.915412][ T9752] RAX: ffffffffffffffda RBX: 00007f979ed24f60 RCX: 00007f979ec120e9 [ 2813.923357][ T9752] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2813.931302][ T9752] RBP: 00007f979ec6c08d R08: 0000000000000000 R09: 0000000000000000 [ 2813.939345][ T9752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2813.947291][ T9752] R13: 00007ffe624163cf R14: 00007f979e388300 R15: 0000000000022000 [ 2813.955241][ T9752] [ 2813.958373][ T9752] memory: usage 864kB, limit 0kB, failcnt 13457 [ 2813.964797][ T9752] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2813.971700][ T9752] Memory cgroup stats for /syz0: [ 2813.972819][ T9752] anon 0 [ 2813.972819][ T9752] file 118784 [ 2813.972819][ T9752] kernel 114688 [ 2813.972819][ T9752] kernel_stack 0 [ 2813.972819][ T9752] pagetables 0 [ 2813.972819][ T9752] percpu 0 [ 2813.972819][ T9752] sock 651264 [ 2813.972819][ T9752] vmalloc 0 [ 2813.972819][ T9752] shmem 118784 [ 2813.972819][ T9752] file_mapped 118784 [ 2813.972819][ T9752] file_dirty 0 [ 2813.972819][ T9752] file_writeback 0 [ 2813.972819][ T9752] swapcached 0 [ 2813.972819][ T9752] inactive_anon 57344 [ 2813.972819][ T9752] active_anon 61440 [ 2813.972819][ T9752] inactive_file 0 [ 2813.972819][ T9752] active_file 0 [ 2813.972819][ T9752] unevictable 0 [ 2813.972819][ T9752] slab_reclaimable 3256 [ 2813.972819][ T9752] slab_unreclaimable 107736 [ 2813.972819][ T9752] slab 110992 [ 2813.972819][ T9752] workingset_refault_anon 0 [ 2813.972819][ T9752] workingset_refault_file 48 [ 2813.972819][ T9752] workingset_activate_anon 0 [ 2813.972819][ T9752] workingset_activate_file 0 [ 2814.066638][ T9752] Out of memory and no killable processes... [ 2814.188106][T20545] device hsr_slave_0 left promiscuous mode [ 2814.194300][T20545] device hsr_slave_1 left promiscuous mode [ 2814.200901][T20545] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2814.208342][T20545] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2814.216154][T20545] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2814.223535][T20545] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2814.231497][T20545] device bridge_slave_1 left promiscuous mode [ 2814.237775][T20545] bridge0: port 2(bridge_slave_1) entered disabled state [ 2814.245692][T20545] device bridge_slave_0 left promiscuous mode [ 2814.251841][T20545] bridge0: port 1(bridge_slave_0) entered disabled state [ 2814.262669][T20545] device veth1_macvtap left promiscuous mode [ 2814.268660][T20545] device veth0_macvtap left promiscuous mode [ 2814.274681][T20545] device veth1_vlan left promiscuous mode [ 2814.280492][T20545] device veth0_vlan left promiscuous mode [ 2814.362367][T20545] team0 (unregistering): Port device team_slave_1 removed [ 2814.372283][T20545] team0 (unregistering): Port device team_slave_0 removed [ 2814.382002][T20545] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2814.393336][T20545] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2814.422726][T20545] bond0 (unregistering): Released all slaves [ 2814.773538][ T9756] chnl_net:caif_netlink_parms(): no params data found [ 2814.801476][ T9756] bridge0: port 1(bridge_slave_0) entered blocking state [ 2814.808531][ T9756] bridge0: port 1(bridge_slave_0) entered disabled state [ 2814.816936][ T9756] device bridge_slave_0 entered promiscuous mode [ 2814.824270][ T9756] bridge0: port 2(bridge_slave_1) entered blocking state [ 2814.831314][ T9756] bridge0: port 2(bridge_slave_1) entered disabled state [ 2814.838988][ T9756] device bridge_slave_1 entered promiscuous mode [ 2814.855422][ T9756] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2814.865532][ T9756] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2814.883510][ T9756] team0: Port device team_slave_0 added [ 2814.890011][ T9756] team0: Port device team_slave_1 added [ 2814.904538][ T9756] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2814.911480][ T9756] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2814.937401][ T9756] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2814.948600][ T9756] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2814.955549][ T9756] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2814.981452][ T9756] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2815.003350][ T9756] device hsr_slave_0 entered promiscuous mode [ 2815.009971][ T9756] device hsr_slave_1 entered promiscuous mode [ 2815.016325][ T9756] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2815.023845][ T9756] Cannot create hsr debugfs directory [ 2815.050538][ T9756] bridge0: port 2(bridge_slave_1) entered blocking state [ 2815.057574][ T9756] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2815.064767][ T9756] bridge0: port 1(bridge_slave_0) entered blocking state [ 2815.071799][ T9756] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2815.098838][ T9756] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2815.109670][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2815.117706][ T76] bridge0: port 1(bridge_slave_0) entered disabled state [ 2815.125733][ T76] bridge0: port 2(bridge_slave_1) entered disabled state [ 2815.137639][ T9756] 8021q: adding VLAN 0 to HW filter on device team0 [ 2815.157914][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2815.166305][ T76] bridge0: port 1(bridge_slave_0) entered blocking state [ 2815.173369][ T76] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2815.181134][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2815.189407][ T76] bridge0: port 2(bridge_slave_1) entered blocking state [ 2815.196443][ T76] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2815.205063][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2815.213736][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2815.222410][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2815.232842][ T9756] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2815.243916][ T9756] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2815.253588][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2815.261384][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2815.275416][ T9756] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2815.282655][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2815.290157][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2815.357148][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2815.394937][ T9756] device veth0_vlan entered promiscuous mode [ 2815.403341][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2815.411801][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2815.419442][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2815.428276][ T9756] device veth1_vlan entered promiscuous mode [ 2815.441254][ T9756] device veth0_macvtap entered promiscuous mode [ 2815.449000][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2815.457194][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2815.465895][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2815.474135][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2815.483042][ T9756] device veth1_macvtap entered promiscuous mode [ 2815.494305][ T9756] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2815.504804][ T9756] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2815.514610][ T9756] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2815.525074][ T9756] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2815.534862][ T9756] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2815.545282][ T9756] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2815.555258][ T9756] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2815.565686][ T9756] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2815.575575][ T9756] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2815.586013][ T9756] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2815.595844][ T9756] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2815.606355][ T9756] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2815.617816][ T9756] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2815.625528][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2815.636073][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2815.645740][ T9756] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2815.656148][ T9756] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2815.665955][ T9756] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2815.676417][ T9756] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2815.686271][ T9756] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2815.696680][ T9756] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2815.706506][ T9756] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2815.716909][ T9756] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2815.727148][ T9756] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2815.737557][ T9756] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2815.747385][ T9756] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2815.757794][ T9756] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2815.768805][ T9756] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2815.779929][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2815.788536][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 23:16:31 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) 23:16:31 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x4102, 0x0) 23:16:31 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000240), r0) 23:16:31 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, 0x0}, 0x0) 23:16:31 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0x0, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:16:31 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000015c0)=""/188, 0xbc}], 0x1, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:16:31 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @empty, 0x0, 0x0, 'lblcr\x00'}, {@loopback}}, 0x44) 23:16:31 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x3b, 0x0, &(0x7f0000000100)) 23:16:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000017c0)={{0x2, 0x0, @broadcast}, {0x0, @dev}, 0x8, {0x2, 0x0, @private}, 'ip_vti0\x00'}) [ 2815.832785][ T9790] IPVS: set_ctl: invalid protocol: 0 0.0.0.0:0 [ 2815.911203][ T9756] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2815.921164][ T9756] CPU: 1 PID: 9756 Comm: syz-executor.0 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2815.931668][ T9756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2815.941697][ T9756] Call Trace: [ 2815.944954][ T9756] [ 2815.947892][ T9756] dump_stack_lvl+0xd6/0x122 [ 2815.952483][ T9756] dump_stack+0x11/0x12 [ 2815.956622][ T9756] dump_header+0x98/0x410 [ 2815.960956][ T9756] oom_kill_process+0xfe/0x550 [ 2815.965701][ T9756] out_of_memory+0x620/0x880 [ 2815.970285][ T9756] mem_cgroup_oom+0x475/0x4f0 [ 2815.974983][ T9756] try_charge_memcg+0x746/0x960 [ 2815.979893][ T9756] ? try_to_unlazy+0x3c9/0x540 [ 2815.984663][ T9756] obj_cgroup_charge+0x171/0x2b0 [ 2815.989604][ T9756] memcg_slab_pre_alloc_hook+0xf7/0x170 [ 2815.995192][ T9756] ? __d_alloc+0x3d/0x380 [ 2815.999620][ T9756] kmem_cache_alloc_lru+0x76/0x2b0 [ 2816.004715][ T9756] ? __d_lookup+0x3a6/0x3d0 [ 2816.009219][ T9756] __d_alloc+0x3d/0x380 [ 2816.013351][ T9756] d_alloc+0x2a/0x100 [ 2816.017361][ T9756] __lookup_hash+0x8f/0x180 [ 2816.021842][ T9756] filename_create+0x147/0x2b0 [ 2816.026584][ T9756] do_mkdirat+0x63/0x280 [ 2816.030806][ T9756] __x64_sys_mkdirat+0x4c/0x60 [ 2816.035594][ T9756] do_syscall_64+0x2b/0x70 [ 2816.040063][ T9756] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2816.045952][ T9756] RIP: 0033:0x7f4c32b2e1f7 [ 2816.050351][ T9756] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2816.070259][ T9756] RSP: 002b:00007ffce82f8b98 EFLAGS: 00000202 ORIG_RAX: 0000000000000102 [ 2816.078658][ T9756] RAX: ffffffffffffffda RBX: 00007ffce82f8c20 RCX: 00007f4c32b2e1f7 [ 2816.086608][ T9756] RDX: 00000000000001ff RSI: 00007ffce82f8c20 RDI: 00000000ffffff9c [ 2816.094559][ T9756] RBP: 00007ffce82f8bfc R08: 0000000000000000 R09: 0000000000000003 [ 2816.102508][ T9756] R10: 00007ffce82f8937 R11: 0000000000000202 R12: 0000000000000032 [ 2816.110457][ T9756] R13: 00000000002af751 R14: 0000000000000002 R15: 00007ffce82f8c60 [ 2816.118411][ T9756] [ 2816.121517][ T9756] memory: usage 920kB, limit 0kB, failcnt 13476 [ 2816.127773][ T9756] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2816.134609][ T9756] Memory cgroup stats for /syz0: [ 2816.137738][ T9756] anon 32768 [ 2816.137738][ T9756] file 118784 [ 2816.137738][ T9756] kernel 135168 [ 2816.137738][ T9756] kernel_stack 0 [ 2816.137738][ T9756] pagetables 8192 [ 2816.137738][ T9756] percpu 0 [ 2816.137738][ T9756] sock 651264 [ 2816.137738][ T9756] vmalloc 0 [ 2816.137738][ T9756] shmem 118784 [ 2816.137738][ T9756] file_mapped 118784 [ 2816.137738][ T9756] file_dirty 0 [ 2816.137738][ T9756] file_writeback 0 [ 2816.137738][ T9756] swapcached 0 [ 2816.137738][ T9756] inactive_anon 90112 [ 2816.137738][ T9756] active_anon 61440 [ 2816.137738][ T9756] inactive_file 0 [ 2816.137738][ T9756] active_file 0 [ 2816.137738][ T9756] unevictable 0 [ 2816.137738][ T9756] slab_reclaimable 5808 [ 2816.137738][ T9756] slab_unreclaimable 111280 [ 2816.137738][ T9756] slab 117088 [ 2816.137738][ T9756] workingset_refault_anon 0 [ 2816.137738][ T9756] workingset_refault_file 48 [ 2816.137738][ T9756] workingset_activate_anon 0 [ 2816.137738][ T9756] workingset_activate_file 0 [ 2816.231905][ T9756] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=9756,uid=0 [ 2816.247127][ T9756] Memory cgroup out of memory: Killed process 9756 (syz-executor.0) total-vm:42336kB, anon-rss:364kB, file-rss:8192kB, shmem-rss:0kB, UID:0 pgtables:72kB oom_score_adj:0 [ 2816.271468][ T9799] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2816.283038][ T9799] CPU: 0 PID: 9799 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2816.293563][ T9799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2816.303606][ T9799] Call Trace: [ 2816.306889][ T9799] [ 2816.309799][ T9799] dump_stack_lvl+0xd6/0x122 [ 2816.314372][ T9799] dump_stack+0x11/0x12 [ 2816.318540][ T9799] dump_header+0x98/0x410 [ 2816.322908][ T9799] out_of_memory+0x65e/0x880 [ 2816.327483][ T9799] memory_max_write+0x31b/0x420 [ 2816.332314][ T9799] ? memory_max_show+0x70/0x70 [ 2816.337067][ T9799] cgroup_file_write+0x167/0x300 [ 2816.341993][ T9799] ? __check_object_size+0x235/0x380 [ 2816.347363][ T9799] ? cgroup_seqfile_stop+0x70/0x70 [ 2816.352513][ T9799] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2816.357795][ T9799] vfs_write+0x71c/0x890 [ 2816.362054][ T9799] ksys_write+0xe8/0x1a0 [ 2816.366279][ T9799] __x64_sys_write+0x3e/0x50 [ 2816.371025][ T9799] do_syscall_64+0x2b/0x70 [ 2816.375444][ T9799] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2816.381347][ T9799] RIP: 0033:0x7fce18d590e9 [ 2816.385759][ T9799] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 23:16:32 executing program 1: openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) [ 2816.405366][ T9799] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2816.413807][ T9799] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2816.421836][ T9799] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2816.429803][ T9799] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2816.437755][ T9799] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2816.445787][ T9799] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2816.453829][ T9799] [ 2816.456957][ T9799] memory: usage 868kB, limit 0kB, failcnt 13493 23:16:32 executing program 4: socketpair(0x1, 0x0, 0x43, 0x0) 23:16:32 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)={0x4c}, 0x4c}}, 0x0) [ 2816.458996][ T9809] IPVS: set_ctl: invalid protocol: 0 0.0.0.0:0 [ 2816.463328][ T9799] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2816.476538][ T9799] Memory cgroup stats for /syz0: [ 2816.482074][ T9799] anon 0 [ 2816.482074][ T9799] file 118784 [ 2816.482074][ T9799] kernel 118784 [ 2816.482074][ T9799] kernel_stack 0 [ 2816.482074][ T9799] pagetables 0 [ 2816.482074][ T9799] percpu 0 [ 2816.482074][ T9799] sock 651264 [ 2816.482074][ T9799] vmalloc 0 [ 2816.482074][ T9799] shmem 118784 [ 2816.482074][ T9799] file_mapped 118784 [ 2816.482074][ T9799] file_dirty 0 [ 2816.482074][ T9799] file_writeback 0 [ 2816.482074][ T9799] swapcached 0 [ 2816.482074][ T9799] inactive_anon 57344 [ 2816.482074][ T9799] active_anon 61440 [ 2816.482074][ T9799] inactive_file 0 [ 2816.482074][ T9799] active_file 0 [ 2816.482074][ T9799] unevictable 0 [ 2816.482074][ T9799] slab_reclaimable 3256 [ 2816.482074][ T9799] slab_unreclaimable 111016 [ 2816.482074][ T9799] slab 114272 [ 2816.482074][ T9799] workingset_refault_anon 0 [ 2816.482074][ T9799] workingset_refault_file 48 [ 2816.482074][ T9799] workingset_activate_anon 0 [ 2816.482074][ T9799] workingset_activate_file 0 [ 2816.575798][ T9799] Out of memory and no killable processes... [ 2816.582140][ T9804] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2816.592347][ T9804] CPU: 0 PID: 9804 Comm: syz-executor.5 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2816.602812][ T9804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2816.612869][ T9804] Call Trace: [ 2816.616142][ T9804] [ 2816.619102][ T9804] dump_stack_lvl+0xd6/0x122 [ 2816.623709][ T9804] dump_stack+0x11/0x12 [ 2816.627877][ T9804] dump_header+0x98/0x410 [ 2816.632218][ T9804] out_of_memory+0x65e/0x880 [ 2816.636853][ T9804] memory_max_write+0x31b/0x420 [ 2816.641769][ T9804] ? memory_max_show+0x70/0x70 [ 2816.646534][ T9804] cgroup_file_write+0x167/0x300 [ 2816.651460][ T9804] ? __check_object_size+0x235/0x380 [ 2816.656731][ T9804] ? cgroup_seqfile_stop+0x70/0x70 [ 2816.661853][ T9804] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2816.667178][ T9804] vfs_write+0x71c/0x890 [ 2816.671541][ T9804] ksys_write+0xe8/0x1a0 [ 2816.675774][ T9804] __x64_sys_write+0x3e/0x50 [ 2816.680439][ T9804] do_syscall_64+0x2b/0x70 [ 2816.684911][ T9804] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2816.690785][ T9804] RIP: 0033:0x7f979ec120e9 [ 2816.695255][ T9804] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2816.714918][ T9804] RSP: 002b:00007f979e367168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2816.723338][ T9804] RAX: ffffffffffffffda RBX: 00007f979ed25030 RCX: 00007f979ec120e9 [ 2816.731288][ T9804] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2816.739236][ T9804] RBP: 00007f979ec6c08d R08: 0000000000000000 R09: 0000000000000000 [ 2816.747188][ T9804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2816.755248][ T9804] R13: 00007ffe624163cf R14: 00007f979e367300 R15: 0000000000022000 [ 2816.763214][ T9804] [ 2816.766415][ T9804] memory: usage 868kB, limit 0kB, failcnt 13493 [ 2816.772645][ T9804] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2816.779559][ T9804] Memory cgroup stats for /syz0: [ 2816.780534][ T9804] anon 0 [ 2816.780534][ T9804] file 118784 [ 2816.780534][ T9804] kernel 118784 [ 2816.780534][ T9804] kernel_stack 0 [ 2816.780534][ T9804] pagetables 0 [ 2816.780534][ T9804] percpu 0 [ 2816.780534][ T9804] sock 651264 [ 2816.780534][ T9804] vmalloc 0 [ 2816.780534][ T9804] shmem 118784 [ 2816.780534][ T9804] file_mapped 118784 [ 2816.780534][ T9804] file_dirty 0 [ 2816.780534][ T9804] file_writeback 0 [ 2816.780534][ T9804] swapcached 0 [ 2816.780534][ T9804] inactive_anon 57344 [ 2816.780534][ T9804] active_anon 61440 [ 2816.780534][ T9804] inactive_file 0 [ 2816.780534][ T9804] active_file 0 [ 2816.780534][ T9804] unevictable 0 [ 2816.780534][ T9804] slab_reclaimable 3256 [ 2816.780534][ T9804] slab_unreclaimable 111016 [ 2816.780534][ T9804] slab 114272 [ 2816.780534][ T9804] workingset_refault_anon 0 [ 2816.780534][ T9804] workingset_refault_file 48 [ 2816.780534][ T9804] workingset_activate_anon 0 [ 2816.780534][ T9804] workingset_activate_file 0 [ 2816.874080][ T9804] Out of memory and no killable processes... 23:16:32 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 23:16:32 executing program 1: socketpair(0x10, 0x2, 0x3, 0x0) 23:16:32 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0x0, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:16:32 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet6(r0, &(0x7f00000013c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x14}, 0x2}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000040)="f0", 0x1}], 0x1}}], 0x1, 0x0) 23:16:32 executing program 4: socketpair(0x2, 0xa, 0xffffff89, 0x0) 23:16:32 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000015c0)=""/188, 0xbc}], 0x1, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:16:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, 0x0, 0x0) 23:16:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x34, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_SECRET={0x4}]}, 0x34}}, 0x0) 23:16:32 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000040)={'nat\x00', 0x2, [{}, {}]}, 0x48) [ 2817.019728][ T9823] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2817.029981][ T9823] CPU: 1 PID: 9823 Comm: syz-executor.5 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2817.040471][ T9823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2817.050522][ T9823] Call Trace: [ 2817.053796][ T9823] [ 2817.056781][ T9823] dump_stack_lvl+0xd6/0x122 [ 2817.061383][ T9823] dump_stack+0x11/0x12 [ 2817.065621][ T9823] dump_header+0x98/0x410 [ 2817.069952][ T9823] out_of_memory+0x65e/0x880 [ 2817.074556][ T9823] memory_max_write+0x31b/0x420 [ 2817.079511][ T9823] ? memory_max_show+0x70/0x70 [ 2817.084334][ T9823] cgroup_file_write+0x167/0x300 [ 2817.089330][ T9823] ? __check_object_size+0x235/0x380 [ 2817.094675][ T9823] ? cgroup_seqfile_stop+0x70/0x70 [ 2817.099864][ T9823] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2817.105218][ T9823] vfs_write+0x71c/0x890 [ 2817.109465][ T9823] ksys_write+0xe8/0x1a0 [ 2817.113752][ T9823] __x64_sys_write+0x3e/0x50 [ 2817.118405][ T9823] do_syscall_64+0x2b/0x70 [ 2817.123003][ T9823] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2817.128960][ T9823] RIP: 0033:0x7f979ec120e9 [ 2817.133369][ T9823] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2817.152977][ T9823] RSP: 002b:00007f979e388168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2817.161387][ T9823] RAX: ffffffffffffffda RBX: 00007f979ed24f60 RCX: 00007f979ec120e9 [ 2817.169353][ T9823] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000b [ 2817.177367][ T9823] RBP: 00007f979ec6c08d R08: 0000000000000000 R09: 0000000000000000 [ 2817.185339][ T9823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2817.193307][ T9823] R13: 00007ffe624163cf R14: 00007f979e388300 R15: 0000000000022000 [ 2817.201354][ T9823] [ 2817.204397][ T9823] memory: usage 864kB, limit 0kB, failcnt 13493 [ 2817.210651][ T9823] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2817.217505][ T9823] Memory cgroup stats for /syz0: [ 2817.247662][ T9823] anon 0 [ 2817.247662][ T9823] file 118784 [ 2817.247662][ T9823] kernel 114688 [ 2817.247662][ T9823] kernel_stack 0 [ 2817.247662][ T9823] pagetables 0 [ 2817.247662][ T9823] percpu 0 [ 2817.247662][ T9823] sock 651264 [ 2817.247662][ T9823] vmalloc 0 [ 2817.247662][ T9823] shmem 118784 [ 2817.247662][ T9823] file_mapped 118784 [ 2817.247662][ T9823] file_dirty 0 [ 2817.247662][ T9823] file_writeback 0 [ 2817.247662][ T9823] swapcached 0 [ 2817.247662][ T9823] inactive_anon 57344 [ 2817.247662][ T9823] active_anon 61440 [ 2817.247662][ T9823] inactive_file 0 [ 2817.247662][ T9823] active_file 0 [ 2817.247662][ T9823] unevictable 0 [ 2817.247662][ T9823] slab_reclaimable 3256 [ 2817.247662][ T9823] slab_unreclaimable 107736 [ 2817.247662][ T9823] slab 110992 [ 2817.247662][ T9823] workingset_refault_anon 0 [ 2817.247662][ T9823] workingset_refault_file 48 [ 2817.247662][ T9823] workingset_activate_anon 0 [ 2817.247662][ T9823] workingset_activate_file 0 [ 2817.341259][ T9823] Out of memory and no killable processes... [ 2817.350240][ T9825] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2817.360553][ T9825] CPU: 0 PID: 9825 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2817.371018][ T9825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2817.381070][ T9825] Call Trace: [ 2817.384414][ T9825] [ 2817.387380][ T9825] dump_stack_lvl+0xd6/0x122 [ 2817.391984][ T9825] dump_stack+0x11/0x12 [ 2817.396139][ T9825] dump_header+0x98/0x410 [ 2817.400475][ T9825] out_of_memory+0x65e/0x880 [ 2817.405064][ T9825] memory_max_write+0x31b/0x420 [ 2817.409944][ T9825] ? memory_max_show+0x70/0x70 [ 2817.414713][ T9825] cgroup_file_write+0x167/0x300 [ 2817.419665][ T9825] ? __check_object_size+0x235/0x380 [ 2817.424949][ T9825] ? cgroup_seqfile_stop+0x70/0x70 [ 2817.430064][ T9825] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2817.435426][ T9825] vfs_write+0x71c/0x890 [ 2817.439682][ T9825] ksys_write+0xe8/0x1a0 [ 2817.443928][ T9825] __x64_sys_write+0x3e/0x50 [ 2817.448547][ T9825] do_syscall_64+0x2b/0x70 [ 2817.453117][ T9825] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2817.459024][ T9825] RIP: 0033:0x7fce18d590e9 [ 2817.463436][ T9825] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2817.483036][ T9825] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2817.491452][ T9825] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 23:16:33 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000015c0)=""/188, 0xbc}], 0x1, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2817.499426][ T9825] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2817.507480][ T9825] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2817.515528][ T9825] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2817.523583][ T9825] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2817.531558][ T9825] [ 2817.535279][ T9825] memory: usage 864kB, limit 0kB, failcnt 13493 [ 2817.541668][ T9825] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 23:16:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x14}, 0x14}}, 0x0) [ 2817.548610][ T9825] Memory cgroup stats for /syz0: [ 2817.556466][ T9825] anon 0 [ 2817.556466][ T9825] file 118784 [ 2817.556466][ T9825] kernel 114688 [ 2817.556466][ T9825] kernel_stack 0 [ 2817.556466][ T9825] pagetables 0 [ 2817.556466][ T9825] percpu 0 [ 2817.556466][ T9825] sock 651264 [ 2817.556466][ T9825] vmalloc 0 [ 2817.556466][ T9825] shmem 118784 [ 2817.556466][ T9825] file_mapped 118784 [ 2817.556466][ T9825] file_dirty 0 [ 2817.556466][ T9825] file_writeback 0 [ 2817.556466][ T9825] swapcached 0 23:16:33 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, &(0x7f0000000040)) 23:16:33 executing program 1: socketpair(0x22, 0x0, 0x0, 0x0) 23:16:33 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0x0, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2817.556466][ T9825] inactive_anon 57344 [ 2817.556466][ T9825] active_anon 61440 [ 2817.556466][ T9825] inactive_file 0 [ 2817.556466][ T9825] active_file 0 [ 2817.556466][ T9825] unevictable 0 [ 2817.556466][ T9825] slab_reclaimable 3256 [ 2817.556466][ T9825] slab_unreclaimable 107736 [ 2817.556466][ T9825] slab 110992 [ 2817.556466][ T9825] workingset_refault_anon 0 [ 2817.556466][ T9825] workingset_refault_file 48 [ 2817.556466][ T9825] workingset_activate_anon 0 [ 2817.556466][ T9825] workingset_activate_file 0 [ 2817.650303][ T9825] Out of memory and no killable processes... 23:16:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x1}, 0x14}}, 0x0) [ 2817.743268][ T9840] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2817.753495][ T9840] CPU: 0 PID: 9840 Comm: syz-executor.5 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2817.763899][ T9840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2817.773966][ T9840] Call Trace: [ 2817.777240][ T9840] [ 2817.780167][ T9840] dump_stack_lvl+0xd6/0x122 [ 2817.784846][ T9840] dump_stack+0x11/0x12 [ 2817.789057][ T9840] dump_header+0x98/0x410 23:16:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000017c0)={{0x2, 0x0, @broadcast}, {0x1, @dev}, 0x8, {0x2, 0x0, @private}, 'ip_vti0\x00'}) 23:16:33 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) 23:16:33 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockname$l2tp6(r0, 0x0, &(0x7f0000002300)) [ 2817.793429][ T9840] out_of_memory+0x65e/0x880 [ 2817.798027][ T9840] memory_max_write+0x31b/0x420 [ 2817.802964][ T9840] ? memory_max_show+0x70/0x70 [ 2817.807737][ T9840] cgroup_file_write+0x167/0x300 [ 2817.812857][ T9840] ? __check_object_size+0x235/0x380 [ 2817.818154][ T9840] ? cgroup_seqfile_stop+0x70/0x70 [ 2817.823329][ T9840] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2817.828647][ T9840] vfs_write+0x71c/0x890 [ 2817.832891][ T9840] ksys_write+0xe8/0x1a0 [ 2817.837192][ T9840] __x64_sys_write+0x3e/0x50 [ 2817.841805][ T9840] do_syscall_64+0x2b/0x70 [ 2817.846226][ T9840] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2817.852118][ T9840] RIP: 0033:0x7f979ec120e9 [ 2817.856609][ T9840] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2817.876218][ T9840] RSP: 002b:00007f979e388168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2817.884631][ T9840] RAX: ffffffffffffffda RBX: 00007f979ed24f60 RCX: 00007f979ec120e9 [ 2817.892597][ T9840] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000b [ 2817.900566][ T9840] RBP: 00007f979ec6c08d R08: 0000000000000000 R09: 0000000000000000 [ 2817.908543][ T9840] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2817.916518][ T9840] R13: 00007ffe624163cf R14: 00007f979e388300 R15: 0000000000022000 [ 2817.924484][ T9840] [ 2817.927519][ T9840] memory: usage 864kB, limit 0kB, failcnt 13493 [ 2817.933786][ T9840] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2817.940637][ T9840] Memory cgroup stats for /syz0: [ 2817.943491][ T9840] anon 0 [ 2817.943491][ T9840] file 118784 [ 2817.943491][ T9840] kernel 114688 [ 2817.943491][ T9840] kernel_stack 0 [ 2817.943491][ T9840] pagetables 0 [ 2817.943491][ T9840] percpu 0 [ 2817.943491][ T9840] sock 651264 [ 2817.943491][ T9840] vmalloc 0 [ 2817.943491][ T9840] shmem 118784 [ 2817.943491][ T9840] file_mapped 118784 [ 2817.943491][ T9840] file_dirty 0 [ 2817.943491][ T9840] file_writeback 0 [ 2817.943491][ T9840] swapcached 0 [ 2817.943491][ T9840] inactive_anon 57344 [ 2817.943491][ T9840] active_anon 61440 [ 2817.943491][ T9840] inactive_file 0 [ 2817.943491][ T9840] active_file 0 [ 2817.943491][ T9840] unevictable 0 [ 2817.943491][ T9840] slab_reclaimable 3256 [ 2817.943491][ T9840] slab_unreclaimable 107736 [ 2817.943491][ T9840] slab 110992 [ 2817.943491][ T9840] workingset_refault_anon 0 [ 2817.943491][ T9840] workingset_refault_file 48 [ 2817.943491][ T9840] workingset_activate_anon 0 [ 2817.943491][ T9840] workingset_activate_file 0 [ 2818.036949][ T9840] Out of memory and no killable processes... [ 2818.044415][ T9847] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2818.054808][ T9847] CPU: 1 PID: 9847 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2818.065270][ T9847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2818.075302][ T9847] Call Trace: [ 2818.078559][ T9847] [ 2818.081472][ T9847] dump_stack_lvl+0xd6/0x122 [ 2818.086186][ T9847] dump_stack+0x11/0x12 [ 2818.090320][ T9847] dump_header+0x98/0x410 [ 2818.094680][ T9847] out_of_memory+0x65e/0x880 [ 2818.099262][ T9847] memory_max_write+0x31b/0x420 [ 2818.104093][ T9847] ? memory_max_show+0x70/0x70 [ 2818.108839][ T9847] cgroup_file_write+0x167/0x300 [ 2818.113846][ T9847] ? __check_object_size+0x235/0x380 [ 2818.119108][ T9847] ? cgroup_seqfile_stop+0x70/0x70 [ 2818.124265][ T9847] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2818.129616][ T9847] vfs_write+0x71c/0x890 [ 2818.133904][ T9847] ksys_write+0xe8/0x1a0 [ 2818.138172][ T9847] __x64_sys_write+0x3e/0x50 [ 2818.142749][ T9847] do_syscall_64+0x2b/0x70 [ 2818.147204][ T9847] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2818.153083][ T9847] RIP: 0033:0x7fce18d590e9 [ 2818.157488][ T9847] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2818.177114][ T9847] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2818.185511][ T9847] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2818.193475][ T9847] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2818.201427][ T9847] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2818.209391][ T9847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2818.217361][ T9847] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2818.225326][ T9847] [ 2818.228389][ T9847] memory: usage 864kB, limit 0kB, failcnt 13493 [ 2818.234888][ T9847] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2818.241828][ T9847] Memory cgroup stats for /syz0: [ 2818.245032][ T9847] anon 0 [ 2818.245032][ T9847] file 118784 [ 2818.245032][ T9847] kernel 114688 [ 2818.245032][ T9847] kernel_stack 0 [ 2818.245032][ T9847] pagetables 0 [ 2818.245032][ T9847] percpu 0 [ 2818.245032][ T9847] sock 651264 [ 2818.245032][ T9847] vmalloc 0 [ 2818.245032][ T9847] shmem 118784 [ 2818.245032][ T9847] file_mapped 118784 [ 2818.245032][ T9847] file_dirty 0 [ 2818.245032][ T9847] file_writeback 0 [ 2818.245032][ T9847] swapcached 0 [ 2818.245032][ T9847] inactive_anon 57344 [ 2818.245032][ T9847] active_anon 61440 [ 2818.245032][ T9847] inactive_file 0 [ 2818.245032][ T9847] active_file 0 [ 2818.245032][ T9847] unevictable 0 [ 2818.245032][ T9847] slab_reclaimable 3256 [ 2818.245032][ T9847] slab_unreclaimable 107736 [ 2818.245032][ T9847] slab 110992 [ 2818.245032][ T9847] workingset_refault_anon 0 [ 2818.245032][ T9847] workingset_refault_file 48 [ 2818.245032][ T9847] workingset_activate_anon 0 [ 2818.245032][ T9847] workingset_activate_file 0 [ 2818.339341][ T9847] Out of memory and no killable processes... [ 2818.506986][T29580] device hsr_slave_0 left promiscuous mode [ 2818.513019][T29580] device hsr_slave_1 left promiscuous mode [ 2818.519464][T29580] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2818.526951][T29580] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2818.534681][T29580] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2818.542086][T29580] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2818.549798][T29580] device bridge_slave_1 left promiscuous mode [ 2818.556118][T29580] bridge0: port 2(bridge_slave_1) entered disabled state [ 2818.563651][T29580] device bridge_slave_0 left promiscuous mode [ 2818.569785][T29580] bridge0: port 1(bridge_slave_0) entered disabled state [ 2818.580164][T29580] device veth1_macvtap left promiscuous mode [ 2818.586185][T29580] device veth0_macvtap left promiscuous mode [ 2818.592252][T29580] device veth1_vlan left promiscuous mode [ 2818.598026][T29580] device veth0_vlan left promiscuous mode [ 2818.711545][T29580] team0 (unregistering): Port device team_slave_1 removed [ 2818.722137][T29580] team0 (unregistering): Port device team_slave_0 removed [ 2818.734592][T29580] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2818.746998][T29580] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2818.775125][T29580] bond0 (unregistering): Released all slaves [ 2818.879843][ T9856] chnl_net:caif_netlink_parms(): no params data found [ 2818.909244][ T9856] bridge0: port 1(bridge_slave_0) entered blocking state [ 2818.916306][ T9856] bridge0: port 1(bridge_slave_0) entered disabled state [ 2818.924008][ T9856] device bridge_slave_0 entered promiscuous mode [ 2818.931510][ T9856] bridge0: port 2(bridge_slave_1) entered blocking state [ 2818.938589][ T9856] bridge0: port 2(bridge_slave_1) entered disabled state [ 2818.947160][ T9856] device bridge_slave_1 entered promiscuous mode [ 2818.963262][ T9856] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2818.973588][ T9856] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2818.992205][ T9856] team0: Port device team_slave_0 added [ 2818.998670][ T9856] team0: Port device team_slave_1 added [ 2819.012297][ T9856] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2819.019237][ T9856] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2819.045123][ T9856] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2819.056397][ T9856] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2819.063371][ T9856] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2819.089256][ T9856] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2819.112115][ T9856] device hsr_slave_0 entered promiscuous mode [ 2819.118703][ T9856] device hsr_slave_1 entered promiscuous mode [ 2819.125209][ T9856] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2819.132740][ T9856] Cannot create hsr debugfs directory [ 2819.179107][ T9856] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2819.189000][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2819.199091][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2819.206742][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2819.215674][ T9856] 8021q: adding VLAN 0 to HW filter on device team0 [ 2819.224181][ T1995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2819.232823][ T1995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2819.241129][ T1995] bridge0: port 1(bridge_slave_0) entered blocking state [ 2819.248265][ T1995] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2819.256267][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2819.265858][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2819.274345][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2819.282797][T10079] bridge0: port 2(bridge_slave_1) entered blocking state [ 2819.289911][T10079] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2819.306568][ T1995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2819.315802][ T1995] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2819.324207][ T1995] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2819.332685][ T1995] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2819.341360][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2819.351787][ T9856] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2819.362801][ T9856] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2819.370618][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2819.384656][ T9856] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2819.392858][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2819.400446][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2819.466369][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2819.507318][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2819.515696][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2819.523231][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2819.531741][ T9856] device veth0_vlan entered promiscuous mode [ 2819.540993][ T9856] device veth1_vlan entered promiscuous mode [ 2819.553680][ T9856] device veth0_macvtap entered promiscuous mode [ 2819.561152][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2819.569200][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2819.577293][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2819.585972][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2819.595590][ T9856] device veth1_macvtap entered promiscuous mode [ 2819.605995][ T9856] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2819.616638][ T9856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2819.626439][ T9856] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2819.636920][ T9856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2819.646780][ T9856] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2819.657179][ T9856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2819.666990][ T9856] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2819.677403][ T9856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2819.687209][ T9856] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2819.697799][ T9856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2819.707626][ T9856] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2819.718116][ T9856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2819.729398][ T9856] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2819.737714][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2819.748638][ T9856] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2819.759091][ T9856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2819.768884][ T9856] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2819.779291][ T9856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2819.789100][ T9856] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2819.799504][ T9856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2819.809345][ T9856] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2819.819752][ T9856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2819.829571][ T9856] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2819.839998][ T9856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 23:16:35 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockname$l2tp6(r0, &(0x7f00000022c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000002300)=0x20) 23:16:35 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x230100, 0x0) 23:16:35 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x582a70ef1ff9f4e5) 23:16:35 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000015c0)=""/188, 0xbc}], 0x1, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:16:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000100)={'NETMAP\x00'}, &(0x7f0000000140)=0x1e) 23:16:35 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x0, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2819.849816][ T9856] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2819.860219][ T9856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2819.872165][ T9856] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2819.880456][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 23:16:35 executing program 2: socket$inet(0x2, 0x0, 0xd825) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) socket$inet(0x2, 0x6, 0x81) 23:16:35 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000400), 0x543bc951cf7b3bb5, 0x0) 23:16:35 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) write$cgroup_devices(r0, 0x0, 0x0) [ 2819.991059][ T9903] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2820.001512][ T9903] CPU: 1 PID: 9903 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2820.011988][ T9903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2820.022128][ T9903] Call Trace: [ 2820.025432][ T9903] [ 2820.028344][ T9903] dump_stack_lvl+0xd6/0x122 [ 2820.032920][ T9903] dump_stack+0x11/0x12 [ 2820.037097][ T9903] dump_header+0x98/0x410 [ 2820.041429][ T9903] oom_kill_process+0xfe/0x550 [ 2820.046224][ T9903] out_of_memory+0x620/0x880 [ 2820.050802][ T9903] memory_max_write+0x31b/0x420 [ 2820.055780][ T9903] ? memory_max_show+0x70/0x70 [ 2820.060553][ T9903] cgroup_file_write+0x167/0x300 [ 2820.065481][ T9903] ? __check_object_size+0x235/0x380 [ 2820.070818][ T9903] ? cgroup_seqfile_stop+0x70/0x70 [ 2820.075948][ T9903] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2820.081220][ T9903] vfs_write+0x71c/0x890 [ 2820.085526][ T9903] ksys_write+0xe8/0x1a0 [ 2820.089846][ T9903] __x64_sys_write+0x3e/0x50 [ 2820.094461][ T9903] do_syscall_64+0x2b/0x70 [ 2820.098923][ T9903] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2820.104808][ T9903] RIP: 0033:0x7fce18d590e9 [ 2820.109204][ T9903] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2820.128792][ T9903] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2820.137220][ T9903] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2820.145184][ T9903] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2820.153180][ T9903] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2820.161131][ T9903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2820.169086][ T9903] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2820.177052][ T9903] [ 2820.180226][ T9903] memory: usage 920kB, limit 0kB, failcnt 13493 [ 2820.186480][ T9903] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2820.193345][ T9903] Memory cgroup stats for /syz0: [ 2820.196216][ T9903] anon 32768 [ 2820.196216][ T9903] file 118784 [ 2820.196216][ T9903] kernel 139264 [ 2820.196216][ T9903] kernel_stack 0 [ 2820.196216][ T9903] pagetables 8192 [ 2820.196216][ T9903] percpu 0 [ 2820.196216][ T9903] sock 651264 [ 2820.196216][ T9903] vmalloc 0 [ 2820.196216][ T9903] shmem 118784 [ 2820.196216][ T9903] file_mapped 118784 [ 2820.196216][ T9903] file_dirty 0 [ 2820.196216][ T9903] file_writeback 0 [ 2820.196216][ T9903] swapcached 0 [ 2820.196216][ T9903] inactive_anon 90112 [ 2820.196216][ T9903] active_anon 61440 [ 2820.196216][ T9903] inactive_file 0 [ 2820.196216][ T9903] active_file 0 [ 2820.196216][ T9903] unevictable 0 [ 2820.196216][ T9903] slab_reclaimable 7784 [ 2820.196216][ T9903] slab_unreclaimable 111280 [ 2820.196216][ T9903] slab 119064 [ 2820.196216][ T9903] workingset_refault_anon 0 [ 2820.196216][ T9903] workingset_refault_file 48 [ 2820.196216][ T9903] workingset_activate_anon 0 [ 2820.196216][ T9903] workingset_activate_file 0 [ 2820.290846][ T9903] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=9856,uid=0 [ 2820.306333][ T9903] Memory cgroup out of memory: Killed process 9856 (syz-executor.0) total-vm:42336kB, anon-rss:360kB, file-rss:8192kB, shmem-rss:0kB, UID:0 pgtables:68kB oom_score_adj:0 [ 2820.325894][ T9901] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2820.336150][ T9901] CPU: 0 PID: 9901 Comm: syz-executor.5 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2820.346559][ T9901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2820.356598][ T9901] Call Trace: [ 2820.359865][ T9901] [ 2820.362846][ T9901] dump_stack_lvl+0xd6/0x122 [ 2820.367422][ T9901] dump_stack+0x11/0x12 [ 2820.371559][ T9901] dump_header+0x98/0x410 [ 2820.375874][ T9901] out_of_memory+0x65e/0x880 [ 2820.380465][ T9901] memory_max_write+0x31b/0x420 [ 2820.385299][ T9901] ? memory_max_show+0x70/0x70 [ 2820.390121][ T9901] cgroup_file_write+0x167/0x300 [ 2820.395078][ T9901] ? __check_object_size+0x235/0x380 [ 2820.400377][ T9901] ? cgroup_seqfile_stop+0x70/0x70 [ 2820.405481][ T9901] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2820.410826][ T9901] vfs_write+0x71c/0x890 [ 2820.415060][ T9901] ksys_write+0xe8/0x1a0 [ 2820.419571][ T9901] __x64_sys_write+0x3e/0x50 [ 2820.424182][ T9901] do_syscall_64+0x2b/0x70 [ 2820.428604][ T9901] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2820.434557][ T9901] RIP: 0033:0x7f979ec120e9 [ 2820.438969][ T9901] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2820.458600][ T9901] RSP: 002b:00007f979e388168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2820.466996][ T9901] RAX: ffffffffffffffda RBX: 00007f979ed24f60 RCX: 00007f979ec120e9 [ 2820.474951][ T9901] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000b [ 2820.482922][ T9901] RBP: 00007f979ec6c08d R08: 0000000000000000 R09: 0000000000000000 [ 2820.490899][ T9901] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2820.498860][ T9901] R13: 00007ffe624163cf R14: 00007f979e388300 R15: 0000000000022000 [ 2820.506890][ T9901] [ 2820.510110][ T9901] memory: usage 868kB, limit 0kB, failcnt 13529 [ 2820.516364][ T9901] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2820.523208][ T9901] Memory cgroup stats for /syz0: [ 2820.524038][ T9901] anon 0 [ 2820.524038][ T9901] file 118784 [ 2820.524038][ T9901] kernel 118784 [ 2820.524038][ T9901] kernel_stack 0 [ 2820.524038][ T9901] pagetables 0 [ 2820.524038][ T9901] percpu 0 [ 2820.524038][ T9901] sock 651264 [ 2820.524038][ T9901] vmalloc 0 [ 2820.524038][ T9901] shmem 118784 [ 2820.524038][ T9901] file_mapped 118784 [ 2820.524038][ T9901] file_dirty 0 [ 2820.524038][ T9901] file_writeback 0 [ 2820.524038][ T9901] swapcached 0 [ 2820.524038][ T9901] inactive_anon 57344 [ 2820.524038][ T9901] active_anon 61440 [ 2820.524038][ T9901] inactive_file 0 [ 2820.524038][ T9901] active_file 0 [ 2820.524038][ T9901] unevictable 0 [ 2820.524038][ T9901] slab_reclaimable 3256 [ 2820.524038][ T9901] slab_unreclaimable 111016 [ 2820.524038][ T9901] slab 114272 [ 2820.524038][ T9901] workingset_refault_anon 0 [ 2820.524038][ T9901] workingset_refault_file 48 [ 2820.524038][ T9901] workingset_activate_anon 0 [ 2820.524038][ T9901] workingset_activate_file 0 [ 2820.617706][ T9901] Out of memory and no killable processes... [ 2820.623797][ T9903] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 23:16:36 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000015c0)=""/188, 0xbc}], 0x1, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:16:36 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000440), 0x20202, 0x0) [ 2820.634212][ T9903] CPU: 0 PID: 9903 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2820.644739][ T9903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2820.654791][ T9903] Call Trace: [ 2820.658053][ T9903] [ 2820.661033][ T9903] dump_stack_lvl+0xd6/0x122 [ 2820.665611][ T9903] dump_stack+0x11/0x12 [ 2820.669775][ T9903] dump_header+0x98/0x410 [ 2820.674093][ T9903] out_of_memory+0x65e/0x880 [ 2820.678672][ T9903] memory_max_write+0x31b/0x420 [ 2820.683535][ T9903] ? memory_max_show+0x70/0x70 [ 2820.688330][ T9903] cgroup_file_write+0x167/0x300 23:16:36 executing program 1: setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0xfffffe76) [ 2820.693319][ T9903] ? __check_object_size+0x235/0x380 [ 2820.698663][ T9903] ? cgroup_seqfile_stop+0x70/0x70 [ 2820.703867][ T9903] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2820.709160][ T9903] vfs_write+0x71c/0x890 [ 2820.713483][ T9903] ksys_write+0xe8/0x1a0 [ 2820.717822][ T9903] __x64_sys_write+0x3e/0x50 [ 2820.722517][ T9903] do_syscall_64+0x2b/0x70 [ 2820.726929][ T9903] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2820.732853][ T9903] RIP: 0033:0x7fce18d590e9 [ 2820.737270][ T9903] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2820.756974][ T9903] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2820.765369][ T9903] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2820.773339][ T9903] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2820.781465][ T9903] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2820.789506][ T9903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2820.797566][ T9903] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2820.805543][ T9903] [ 2820.808738][ T9903] memory: usage 868kB, limit 0kB, failcnt 13529 [ 2820.814993][ T9903] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2820.821830][ T9903] Memory cgroup stats for /syz0: [ 2820.822575][ T9903] anon 0 [ 2820.822575][ T9903] file 118784 [ 2820.822575][ T9903] kernel 118784 [ 2820.822575][ T9903] kernel_stack 0 [ 2820.822575][ T9903] pagetables 0 [ 2820.822575][ T9903] percpu 0 [ 2820.822575][ T9903] sock 651264 [ 2820.822575][ T9903] vmalloc 0 [ 2820.822575][ T9903] shmem 118784 [ 2820.822575][ T9903] file_mapped 118784 [ 2820.822575][ T9903] file_dirty 0 [ 2820.822575][ T9903] file_writeback 0 [ 2820.822575][ T9903] swapcached 0 [ 2820.822575][ T9903] inactive_anon 57344 [ 2820.822575][ T9903] active_anon 61440 [ 2820.822575][ T9903] inactive_file 0 [ 2820.822575][ T9903] active_file 0 [ 2820.822575][ T9903] unevictable 0 [ 2820.822575][ T9903] slab_reclaimable 3256 [ 2820.822575][ T9903] slab_unreclaimable 111016 [ 2820.822575][ T9903] slab 114272 [ 2820.822575][ T9903] workingset_refault_anon 0 [ 2820.822575][ T9903] workingset_refault_file 48 [ 2820.822575][ T9903] workingset_activate_anon 0 [ 2820.822575][ T9903] workingset_activate_file 0 [ 2820.916198][ T9903] Out of memory and no killable processes... 23:16:36 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0xca900, 0x0) 23:16:36 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x0, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:16:36 executing program 2: openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000002600), 0xffffffffffffffff) 23:16:36 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000800), 0x48) 23:16:36 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) [ 2820.946673][ T9918] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2820.956941][ T9918] CPU: 0 PID: 9918 Comm: syz-executor.5 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2820.967358][ T9918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2820.977521][ T9918] Call Trace: [ 2820.980798][ T9918] [ 2820.983727][ T9918] dump_stack_lvl+0xd6/0x122 [ 2820.988357][ T9918] dump_stack+0x11/0x12 [ 2820.992531][ T9918] dump_header+0x98/0x410 [ 2820.996871][ T9918] out_of_memory+0x65e/0x880 [ 2821.001472][ T9918] memory_max_write+0x31b/0x420 [ 2821.006331][ T9918] ? memory_max_show+0x70/0x70 [ 2821.011113][ T9918] cgroup_file_write+0x167/0x300 [ 2821.016143][ T9918] ? __check_object_size+0x235/0x380 [ 2821.021509][ T9918] ? cgroup_seqfile_stop+0x70/0x70 [ 2821.026724][ T9918] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2821.032144][ T9918] vfs_write+0x71c/0x890 [ 2821.036479][ T9918] ksys_write+0xe8/0x1a0 [ 2821.040792][ T9918] __x64_sys_write+0x3e/0x50 [ 2821.045390][ T9918] do_syscall_64+0x2b/0x70 [ 2821.049819][ T9918] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2821.055722][ T9918] RIP: 0033:0x7f979ec120e9 [ 2821.060163][ T9918] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2821.079815][ T9918] RSP: 002b:00007f979e388168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2821.088236][ T9918] RAX: ffffffffffffffda RBX: 00007f979ed24f60 RCX: 00007f979ec120e9 23:16:36 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) 23:16:37 executing program 4: socketpair(0x23, 0x0, 0x0, 0x0) [ 2821.096208][ T9918] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000b [ 2821.104185][ T9918] RBP: 00007f979ec6c08d R08: 0000000000000000 R09: 0000000000000000 [ 2821.112202][ T9918] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2821.120175][ T9918] R13: 00007ffe624163cf R14: 00007f979e388300 R15: 0000000000022000 [ 2821.128156][ T9918] [ 2821.131210][ T9918] memory: usage 864kB, limit 0kB, failcnt 13529 [ 2821.137458][ T9918] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 23:16:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000000)={'veth0_to_batadv\x00'}) [ 2821.144306][ T9918] Memory cgroup stats for /syz0: [ 2821.155959][ T9918] anon 0 [ 2821.155959][ T9918] file 118784 [ 2821.155959][ T9918] kernel 114688 [ 2821.155959][ T9918] kernel_stack 0 [ 2821.155959][ T9918] pagetables 0 [ 2821.155959][ T9918] percpu 0 [ 2821.155959][ T9918] sock 651264 [ 2821.155959][ T9918] vmalloc 0 [ 2821.155959][ T9918] shmem 118784 [ 2821.155959][ T9918] file_mapped 118784 [ 2821.155959][ T9918] file_dirty 0 [ 2821.155959][ T9918] file_writeback 0 [ 2821.155959][ T9918] swapcached 0 [ 2821.155959][ T9918] inactive_anon 57344 [ 2821.155959][ T9918] active_anon 61440 [ 2821.155959][ T9918] inactive_file 0 [ 2821.155959][ T9918] active_file 0 [ 2821.155959][ T9918] unevictable 0 [ 2821.155959][ T9918] slab_reclaimable 3256 [ 2821.155959][ T9918] slab_unreclaimable 107736 [ 2821.155959][ T9918] slab 110992 [ 2821.155959][ T9918] workingset_refault_anon 0 [ 2821.155959][ T9918] workingset_refault_file 48 [ 2821.155959][ T9918] workingset_activate_anon 0 [ 2821.155959][ T9918] workingset_activate_file 0 [ 2821.249517][ T9918] Out of memory and no killable processes... 23:16:37 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000015c0)=""/188, 0xbc}], 0x1, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:16:37 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000011500)='\"', 0x1, 0xe000}, {&(0x7f0000011800)="22001e0000000000001e00080000000008007809140b2a3a0802000001000001010022001e0000000000001e00080000000008007809140b2a3a080200000100000101013400200000000000002064000000000000647809140b2a3a08000000010000011200660069006c0065002e0063006f006c0064002c001f0000000000001f00080000000008007809140b2a3a08020000010000010a00660069006c00650030", 0xa3, 0xf000}], 0x0, &(0x7f0000013500)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f00000007c0)='./file0/file0\x00', 0x0, 0x0) 23:16:37 executing program 2: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) lseek(r0, 0x0, 0x2) 23:16:37 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0x3, &(0x7f00000001c0)=@framed={{0x18, 0x2}}, &(0x7f0000000240)='syzkaller\x00', 0x1, 0x83, &(0x7f00000003c0)=""/131, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2821.353818][ T9934] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2821.364261][ T9934] CPU: 0 PID: 9934 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2821.374678][ T9934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2821.384860][ T9934] Call Trace: [ 2821.388133][ T9934] [ 2821.391061][ T9934] dump_stack_lvl+0xd6/0x122 [ 2821.395690][ T9934] dump_stack+0x11/0x12 [ 2821.399894][ T9934] dump_header+0x98/0x410 [ 2821.404312][ T9934] out_of_memory+0x65e/0x880 [ 2821.408914][ T9934] memory_max_write+0x31b/0x420 [ 2821.413848][ T9934] ? memory_max_show+0x70/0x70 [ 2821.418683][ T9934] cgroup_file_write+0x167/0x300 [ 2821.423729][ T9934] ? __check_object_size+0x235/0x380 [ 2821.429017][ T9934] ? cgroup_seqfile_stop+0x70/0x70 [ 2821.434131][ T9934] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2821.439427][ T9934] vfs_write+0x71c/0x890 [ 2821.443729][ T9934] ksys_write+0xe8/0x1a0 [ 2821.447979][ T9934] __x64_sys_write+0x3e/0x50 [ 2821.452657][ T9934] do_syscall_64+0x2b/0x70 [ 2821.457080][ T9934] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2821.463025][ T9934] RIP: 0033:0x7fce18d590e9 [ 2821.467444][ T9934] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2821.487095][ T9934] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2821.495520][ T9934] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2821.503522][ T9934] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2821.511499][ T9934] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2821.519477][ T9934] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2821.527449][ T9934] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2821.535428][ T9934] [ 2821.538787][ T9934] memory: usage 864kB, limit 0kB, failcnt 13529 [ 2821.545128][ T9934] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2821.552106][ T9934] Memory cgroup stats for /syz0: [ 2821.553217][ T9945] loop4: detected capacity change from 0 to 240 [ 2821.569080][ T9934] anon 0 [ 2821.569080][ T9934] file 118784 [ 2821.569080][ T9934] kernel 114688 [ 2821.569080][ T9934] kernel_stack 0 [ 2821.569080][ T9934] pagetables 0 [ 2821.569080][ T9934] percpu 0 [ 2821.569080][ T9934] sock 651264 [ 2821.569080][ T9934] vmalloc 0 [ 2821.569080][ T9934] shmem 118784 [ 2821.569080][ T9934] file_mapped 118784 [ 2821.569080][ T9934] file_dirty 0 [ 2821.569080][ T9934] file_writeback 0 [ 2821.569080][ T9934] swapcached 0 [ 2821.569080][ T9934] inactive_anon 57344 [ 2821.569080][ T9934] active_anon 61440 [ 2821.569080][ T9934] inactive_file 0 [ 2821.569080][ T9934] active_file 0 [ 2821.569080][ T9934] unevictable 0 [ 2821.569080][ T9934] slab_reclaimable 3256 [ 2821.569080][ T9934] slab_unreclaimable 107736 [ 2821.569080][ T9934] slab 110992 [ 2821.569080][ T9934] workingset_refault_anon 0 [ 2821.569080][ T9934] workingset_refault_file 48 [ 2821.569080][ T9934] workingset_activate_anon 0 [ 2821.569080][ T9934] workingset_activate_file 0 [ 2821.658380][ T9934] Out of memory and no killable processes... [ 2821.750184][ T9948] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2821.760407][ T9948] CPU: 0 PID: 9948 Comm: syz-executor.5 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2821.770864][ T9948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2821.781091][ T9948] Call Trace: [ 2821.784366][ T9948] [ 2821.787289][ T9948] dump_stack_lvl+0xd6/0x122 [ 2821.791950][ T9948] dump_stack+0x11/0x12 [ 2821.796111][ T9948] dump_header+0x98/0x410 [ 2821.800505][ T9948] out_of_memory+0x65e/0x880 [ 2821.805096][ T9948] memory_max_write+0x31b/0x420 [ 2821.809964][ T9948] ? memory_max_show+0x70/0x70 [ 2821.814733][ T9948] cgroup_file_write+0x167/0x300 [ 2821.819689][ T9948] ? __check_object_size+0x235/0x380 [ 2821.825123][ T9948] ? cgroup_seqfile_stop+0x70/0x70 [ 2821.830395][ T9948] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2821.835685][ T9948] vfs_write+0x71c/0x890 [ 2821.839927][ T9948] ksys_write+0xe8/0x1a0 [ 2821.844304][ T9948] __x64_sys_write+0x3e/0x50 [ 2821.848898][ T9948] do_syscall_64+0x2b/0x70 [ 2821.853300][ T9948] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2821.859245][ T9948] RIP: 0033:0x7f979ec120e9 [ 2821.865709][ T9948] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2821.885302][ T9948] RSP: 002b:00007f979e388168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2821.893702][ T9948] RAX: ffffffffffffffda RBX: 00007f979ed24f60 RCX: 00007f979ec120e9 [ 2821.901665][ T9948] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000b [ 2821.909620][ T9948] RBP: 00007f979ec6c08d R08: 0000000000000000 R09: 0000000000000000 [ 2821.917574][ T9948] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2821.925529][ T9948] R13: 00007ffe624163cf R14: 00007f979e388300 R15: 0000000000022000 [ 2821.933533][ T9948] [ 2821.936664][ T9948] memory: usage 864kB, limit 0kB, failcnt 13529 [ 2821.942962][ T9948] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2821.949822][ T9948] Memory cgroup stats for /syz0: [ 2821.950109][ T9948] anon 0 [ 2821.950109][ T9948] file 118784 [ 2821.950109][ T9948] kernel 114688 [ 2821.950109][ T9948] kernel_stack 0 [ 2821.950109][ T9948] pagetables 0 [ 2821.950109][ T9948] percpu 0 [ 2821.950109][ T9948] sock 651264 [ 2821.950109][ T9948] vmalloc 0 [ 2821.950109][ T9948] shmem 118784 [ 2821.950109][ T9948] file_mapped 118784 [ 2821.950109][ T9948] file_dirty 0 [ 2821.950109][ T9948] file_writeback 0 [ 2821.950109][ T9948] swapcached 0 [ 2821.950109][ T9948] inactive_anon 57344 [ 2821.950109][ T9948] active_anon 61440 [ 2821.950109][ T9948] inactive_file 0 [ 2821.950109][ T9948] active_file 0 [ 2821.950109][ T9948] unevictable 0 [ 2821.950109][ T9948] slab_reclaimable 3256 [ 2821.950109][ T9948] slab_unreclaimable 107736 [ 2821.950109][ T9948] slab 110992 [ 2821.950109][ T9948] workingset_refault_anon 0 [ 2821.950109][ T9948] workingset_refault_file 48 [ 2821.950109][ T9948] workingset_activate_anon 0 [ 2821.950109][ T9948] workingset_activate_file 0 [ 2822.043588][ T9948] Out of memory and no killable processes... [ 2822.247439][T29609] device hsr_slave_0 left promiscuous mode [ 2822.253602][T29609] device hsr_slave_1 left promiscuous mode [ 2822.260426][T29609] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2822.267879][T29609] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2822.277626][T29609] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2822.285225][T29609] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2822.292880][T29609] device bridge_slave_1 left promiscuous mode [ 2822.299063][T29609] bridge0: port 2(bridge_slave_1) entered disabled state [ 2822.307295][T29609] device bridge_slave_0 left promiscuous mode [ 2822.313457][T29609] bridge0: port 1(bridge_slave_0) entered disabled state [ 2822.323640][T29609] device veth1_macvtap left promiscuous mode [ 2822.329736][T29609] device veth0_macvtap left promiscuous mode [ 2822.335785][T29609] device veth1_vlan left promiscuous mode [ 2822.341551][T29609] device veth0_vlan left promiscuous mode [ 2822.426908][T29609] team0 (unregistering): Port device team_slave_1 removed [ 2822.436733][T29609] team0 (unregistering): Port device team_slave_0 removed [ 2822.446786][T29609] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2822.458497][T29609] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2822.485476][T29609] bond0 (unregistering): Released all slaves [ 2823.030172][ T9952] chnl_net:caif_netlink_parms(): no params data found [ 2823.060882][ T9952] bridge0: port 1(bridge_slave_0) entered blocking state [ 2823.067986][ T9952] bridge0: port 1(bridge_slave_0) entered disabled state [ 2823.075732][ T9952] device bridge_slave_0 entered promiscuous mode [ 2823.083079][ T9952] bridge0: port 2(bridge_slave_1) entered blocking state [ 2823.090170][ T9952] bridge0: port 2(bridge_slave_1) entered disabled state [ 2823.097828][ T9952] device bridge_slave_1 entered promiscuous mode [ 2823.114205][ T9952] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2823.124411][ T9952] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2823.141566][ T9952] team0: Port device team_slave_0 added [ 2823.148001][ T9952] team0: Port device team_slave_1 added [ 2823.162175][ T9952] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2823.169116][ T9952] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2823.195001][ T9952] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2823.206204][ T9952] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2823.213117][ T9952] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2823.239003][ T9952] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2823.262018][ T9952] device hsr_slave_0 entered promiscuous mode [ 2823.268597][ T9952] device hsr_slave_1 entered promiscuous mode [ 2823.274883][ T9952] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2823.282431][ T9952] Cannot create hsr debugfs directory [ 2823.310660][ T9952] bridge0: port 2(bridge_slave_1) entered blocking state [ 2823.317806][ T9952] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2823.344620][ T9952] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2823.354042][T18607] bridge0: port 2(bridge_slave_1) entered disabled state [ 2823.364102][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2823.373931][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2823.381744][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2823.390940][ T9952] 8021q: adding VLAN 0 to HW filter on device team0 [ 2823.401190][ T1995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2823.409859][ T1995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2823.419573][ T1995] bridge0: port 1(bridge_slave_0) entered blocking state [ 2823.426597][ T1995] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2823.436474][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2823.444753][T20403] bridge0: port 2(bridge_slave_1) entered blocking state [ 2823.451813][T20403] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2823.466855][ T1995] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2823.475562][ T1995] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2823.484169][ T1995] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2823.494237][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2823.505467][ T9952] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2823.516278][ T9952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2823.524059][ T1995] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2823.536786][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2823.544209][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2823.553702][ T9952] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2823.630579][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2823.673729][ T9952] device veth0_vlan entered promiscuous mode [ 2823.680529][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2823.689295][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2823.697024][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2823.707451][ T9952] device veth1_vlan entered promiscuous mode [ 2823.720205][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2823.728048][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2823.736257][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2823.745751][ T9952] device veth0_macvtap entered promiscuous mode [ 2823.753347][ T9952] device veth1_macvtap entered promiscuous mode [ 2823.764262][ T9952] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2823.774729][ T9952] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2823.784523][ T9952] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2823.794929][ T9952] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2823.804721][ T9952] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2823.815127][ T9952] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2823.825019][ T9952] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2823.835420][ T9952] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2823.845264][ T9952] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2823.855673][ T9952] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2823.865576][ T9952] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2823.876047][ T9952] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2823.888285][ T9952] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2823.896635][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2823.906196][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2823.914709][ T9952] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2823.925180][ T9952] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2823.935074][ T9952] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2823.945488][ T9952] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2823.955320][ T9952] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2823.965728][ T9952] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2823.975539][ T9952] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2823.985959][ T9952] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2823.995961][ T9952] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2824.006367][ T9952] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 23:16:39 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000380)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000180)={r1}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000480)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000140)={r2, 0x1, r3}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r2}) 23:16:39 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x81}]}) 23:16:39 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_buf(r0, 0x29, 0x12, 0x0, &(0x7f0000000080)) 23:16:39 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x0, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:16:39 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$BTRFS_IOC_START_SYNC(r0, 0x8904, 0x0) 23:16:39 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000015c0)=""/188, 0xbc}], 0x1, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2824.016231][ T9952] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2824.026637][ T9952] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2824.038422][ T9952] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2824.047332][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 23:16:40 executing program 2: syz_mount_image$vfat(&(0x7f0000002880), &(0x7f00000028c0)='./file0\x00', 0x0, 0x0, &(0x7f0000002940), 0x8880, &(0x7f0000002980)) 23:16:40 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0x3, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x4}}, &(0x7f0000000240)='syzkaller\x00', 0x1, 0x83, &(0x7f00000003c0)=""/131, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2824.126739][ T24] audit: type=1326 audit(1652310999.970:629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9988 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f555a2520e9 code=0x0 23:16:40 executing program 4: syz_emit_ethernet(0x2e, &(0x7f0000000040)={@broadcast, @multicast, @val={@void}, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @private}, {0x14, 0x0, 0x0, @remote}}}}}, 0x0) [ 2824.180131][ T9995] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2824.190337][ T9995] CPU: 0 PID: 9995 Comm: syz-executor.5 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2824.200820][ T9995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2824.210865][ T9995] Call Trace: [ 2824.214124][ T9995] [ 2824.217039][ T9995] dump_stack_lvl+0xd6/0x122 [ 2824.221622][ T9995] dump_stack+0x11/0x12 [ 2824.225765][ T9995] dump_header+0x98/0x410 [ 2824.230156][ T9995] oom_kill_process+0xfe/0x550 [ 2824.234901][ T9995] out_of_memory+0x620/0x880 [ 2824.239479][ T9995] memory_max_write+0x31b/0x420 [ 2824.244419][ T9995] ? memory_max_show+0x70/0x70 [ 2824.249246][ T9995] cgroup_file_write+0x167/0x300 [ 2824.254176][ T9995] ? __check_object_size+0x235/0x380 [ 2824.259449][ T9995] ? cgroup_seqfile_stop+0x70/0x70 [ 2824.264625][ T9995] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2824.269954][ T9995] vfs_write+0x71c/0x890 [ 2824.274201][ T9995] ksys_write+0xe8/0x1a0 23:16:40 executing program 1: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) lseek(r0, 0x4, 0x2) [ 2824.278453][ T9995] __x64_sys_write+0x3e/0x50 [ 2824.283142][ T9995] do_syscall_64+0x2b/0x70 [ 2824.287581][ T9995] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2824.293527][ T9995] RIP: 0033:0x7f979ec120e9 [ 2824.297935][ T9995] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2824.317564][ T9995] RSP: 002b:00007f979e388168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 23:16:40 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) [ 2824.325978][ T9995] RAX: ffffffffffffffda RBX: 00007f979ed24f60 RCX: 00007f979ec120e9 [ 2824.333961][ T9995] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000b [ 2824.341920][ T9995] RBP: 00007f979ec6c08d R08: 0000000000000000 R09: 0000000000000000 [ 2824.349894][ T9995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2824.357854][ T9995] R13: 00007ffe624163cf R14: 00007f979e388300 R15: 0000000000022000 [ 2824.365821][ T9995] [ 2824.369071][ T9995] memory: usage 924kB, limit 0kB, failcnt 13548 [ 2824.375312][ T9995] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2824.382152][ T9995] Memory cgroup stats for /syz0: [ 2824.383322][ T9995] anon 36864 [ 2824.383322][ T9995] file 118784 [ 2824.383322][ T9995] kernel 139264 [ 2824.383322][ T9995] kernel_stack 0 [ 2824.383322][ T9995] pagetables 8192 [ 2824.383322][ T9995] percpu 0 [ 2824.383322][ T9995] sock 651264 [ 2824.383322][ T9995] vmalloc 0 [ 2824.383322][ T9995] shmem 118784 [ 2824.383322][ T9995] file_mapped 118784 [ 2824.383322][ T9995] file_dirty 0 [ 2824.383322][ T9995] file_writeback 0 [ 2824.383322][ T9995] swapcached 0 [ 2824.383322][ T9995] inactive_anon 94208 [ 2824.383322][ T9995] active_anon 61440 [ 2824.383322][ T9995] inactive_file 0 [ 2824.383322][ T9995] active_file 0 [ 2824.383322][ T9995] unevictable 0 [ 2824.383322][ T9995] slab_reclaimable 7784 [ 2824.383322][ T9995] slab_unreclaimable 111280 [ 2824.383322][ T9995] slab 119064 [ 2824.383322][ T9995] workingset_refault_anon 0 [ 2824.383322][ T9995] workingset_refault_file 48 [ 2824.383322][ T9995] workingset_activate_anon 0 [ 2824.383322][ T9995] workingset_activate_file 0 [ 2824.477413][ T9995] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=9952,uid=0 [ 2824.492651][ T9995] Memory cgroup out of memory: Killed process 9952 (syz-executor.0) total-vm:42336kB, anon-rss:364kB, file-rss:8192kB, shmem-rss:0kB, UID:0 pgtables:72kB oom_score_adj:0 [ 2824.511140][ T9993] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2824.521573][ T9993] CPU: 1 PID: 9993 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2824.532011][ T9993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2824.542044][ T9993] Call Trace: [ 2824.545300][ T9993] [ 2824.548238][ T9993] dump_stack_lvl+0xd6/0x122 [ 2824.552812][ T9993] dump_stack+0x11/0x12 [ 2824.556947][ T9993] dump_header+0x98/0x410 [ 2824.561271][ T9993] out_of_memory+0x65e/0x880 [ 2824.565841][ T9993] memory_max_write+0x31b/0x420 [ 2824.570695][ T9993] ? memory_max_show+0x70/0x70 [ 2824.575442][ T9993] cgroup_file_write+0x167/0x300 [ 2824.580388][ T9993] ? __check_object_size+0x235/0x380 [ 2824.585655][ T9993] ? cgroup_seqfile_stop+0x70/0x70 [ 2824.590748][ T9993] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2824.596017][ T9993] vfs_write+0x71c/0x890 [ 2824.600242][ T9993] ksys_write+0xe8/0x1a0 [ 2824.604563][ T9993] __x64_sys_write+0x3e/0x50 [ 2824.609135][ T9993] do_syscall_64+0x2b/0x70 [ 2824.613532][ T9993] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2824.619478][ T9993] RIP: 0033:0x7fce18d590e9 [ 2824.623870][ T9993] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2824.643583][ T9993] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2824.652023][ T9993] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2824.659994][ T9993] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2824.668040][ T9993] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2824.675993][ T9993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2824.683962][ T9993] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2824.691929][ T9993] [ 2824.695010][ T9993] memory: usage 872kB, limit 0kB, failcnt 13565 [ 2824.701252][ T9993] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2824.708133][ T9993] Memory cgroup stats for /syz0: [ 2824.712636][ T9993] anon 0 [ 2824.712636][ T9993] file 118784 [ 2824.712636][ T9993] kernel 122880 [ 2824.712636][ T9993] kernel_stack 0 [ 2824.712636][ T9993] pagetables 0 [ 2824.712636][ T9993] percpu 0 [ 2824.712636][ T9993] sock 651264 [ 2824.712636][ T9993] vmalloc 0 [ 2824.712636][ T9993] shmem 118784 [ 2824.712636][ T9993] file_mapped 118784 [ 2824.712636][ T9993] file_dirty 0 [ 2824.712636][ T9993] file_writeback 0 [ 2824.712636][ T9993] swapcached 0 [ 2824.712636][ T9993] inactive_anon 57344 [ 2824.712636][ T9993] active_anon 61440 [ 2824.712636][ T9993] inactive_file 0 [ 2824.712636][ T9993] active_file 0 [ 2824.712636][ T9993] unevictable 0 [ 2824.712636][ T9993] slab_reclaimable 4632 23:16:40 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2824.712636][ T9993] slab_unreclaimable 111016 [ 2824.712636][ T9993] slab 115648 [ 2824.712636][ T9993] workingset_refault_anon 0 [ 2824.712636][ T9993] workingset_refault_file 48 [ 2824.712636][ T9993] workingset_activate_anon 0 [ 2824.712636][ T9993] workingset_activate_file 0 [ 2824.806822][ T9993] Out of memory and no killable processes... [ 2824.812864][ T9995] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2824.823102][ T9995] CPU: 0 PID: 9995 Comm: syz-executor.5 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2824.833513][ T9995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2824.843568][ T9995] Call Trace: [ 2824.846850][ T9995] [ 2824.849783][ T9995] dump_stack_lvl+0xd6/0x122 [ 2824.854382][ T9995] dump_stack+0x11/0x12 [ 2824.858526][ T9995] dump_header+0x98/0x410 [ 2824.862852][ T9995] out_of_memory+0x65e/0x880 [ 2824.867510][ T9995] memory_max_write+0x31b/0x420 [ 2824.872391][ T9995] ? memory_max_show+0x70/0x70 [ 2824.877143][ T9995] cgroup_file_write+0x167/0x300 [ 2824.882124][ T9995] ? __check_object_size+0x235/0x380 [ 2824.887394][ T9995] ? cgroup_seqfile_stop+0x70/0x70 [ 2824.892503][ T9995] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2824.897853][ T9995] vfs_write+0x71c/0x890 [ 2824.902087][ T9995] ksys_write+0xe8/0x1a0 [ 2824.906385][ T9995] __x64_sys_write+0x3e/0x50 [ 2824.910973][ T9995] do_syscall_64+0x2b/0x70 [ 2824.915376][ T9995] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2824.921274][ T9995] RIP: 0033:0x7f979ec120e9 [ 2824.925677][ T9995] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2824.945296][ T9995] RSP: 002b:00007f979e388168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2824.953702][ T9995] RAX: ffffffffffffffda RBX: 00007f979ed24f60 RCX: 00007f979ec120e9 [ 2824.961675][ T9995] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000b [ 2824.969704][ T9995] RBP: 00007f979ec6c08d R08: 0000000000000000 R09: 0000000000000000 [ 2824.977683][ T9995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2824.985668][ T9995] R13: 00007ffe624163cf R14: 00007f979e388300 R15: 0000000000022000 [ 2824.993691][ T9995] [ 2824.996915][ T9995] memory: usage 868kB, limit 0kB, failcnt 13565 [ 2825.003145][ T9995] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2825.010014][ T9995] Memory cgroup stats for /syz0: [ 2825.011791][ T9995] anon 0 [ 2825.011791][ T9995] file 118784 [ 2825.011791][ T9995] kernel 118784 [ 2825.011791][ T9995] kernel_stack 0 [ 2825.011791][ T9995] pagetables 0 [ 2825.011791][ T9995] percpu 0 [ 2825.011791][ T9995] sock 651264 [ 2825.011791][ T9995] vmalloc 0 [ 2825.011791][ T9995] shmem 118784 [ 2825.011791][ T9995] file_mapped 118784 [ 2825.011791][ T9995] file_dirty 0 [ 2825.011791][ T9995] file_writeback 0 [ 2825.011791][ T9995] swapcached 0 [ 2825.011791][ T9995] inactive_anon 57344 [ 2825.011791][ T9995] active_anon 61440 [ 2825.011791][ T9995] inactive_file 0 [ 2825.011791][ T9995] active_file 0 [ 2825.011791][ T9995] unevictable 0 [ 2825.011791][ T9995] slab_reclaimable 3256 23:16:40 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$BTRFS_IOC_START_SYNC(r0, 0x8914, 0x0) 23:16:40 executing program 1: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) lseek(r0, 0x4, 0x0) 23:16:40 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_buf(r0, 0x29, 0x1d, 0x0, &(0x7f0000000080)) 23:16:40 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0x3, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffff9f}}, &(0x7f0000000240)='syzkaller\x00', 0x1, 0x83, &(0x7f00000003c0)=""/131, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:16:40 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000015c0)=""/188, 0xbc}], 0x1, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:16:41 executing program 0: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) lseek(r0, 0x0, 0x4) [ 2825.011791][ T9995] slab_unreclaimable 111016 [ 2825.011791][ T9995] slab 114272 [ 2825.011791][ T9995] workingset_refault_anon 0 [ 2825.011791][ T9995] workingset_refault_file 48 [ 2825.011791][ T9995] workingset_activate_anon 0 [ 2825.011791][ T9995] workingset_activate_file 0 [ 2825.105522][ T9995] Out of memory and no killable processes... 23:16:41 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x1c35c2, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) 23:16:41 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_buf(r0, 0x29, 0x1a, 0x0, &(0x7f0000000080)) 23:16:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$NL80211_CMD_JOIN_IBSS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000015c0)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0xe}, @void}}}, 0x1c}}, 0x0) [ 2825.267293][T10016] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2825.277797][T10016] CPU: 0 PID: 10016 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2825.288355][T10016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2825.298465][T10016] Call Trace: [ 2825.301743][T10016] [ 2825.304784][T10016] dump_stack_lvl+0xd6/0x122 [ 2825.309386][T10016] dump_stack+0x11/0x12 23:16:41 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0x3, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x10}}, &(0x7f0000000240)='syzkaller\x00', 0x1, 0x83, &(0x7f00000003c0)=""/131, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2825.313644][T10016] dump_header+0x98/0x410 [ 2825.317979][T10016] out_of_memory+0x65e/0x880 [ 2825.322573][T10016] memory_max_write+0x31b/0x420 [ 2825.327433][T10016] ? memory_max_show+0x70/0x70 [ 2825.332199][T10016] cgroup_file_write+0x167/0x300 [ 2825.337142][T10016] ? __check_object_size+0x235/0x380 [ 2825.342425][T10016] ? cgroup_seqfile_stop+0x70/0x70 [ 2825.347573][T10016] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2825.352949][T10016] vfs_write+0x71c/0x890 [ 2825.357248][T10016] ksys_write+0xe8/0x1a0 [ 2825.361517][T10016] __x64_sys_write+0x3e/0x50 [ 2825.366171][T10016] do_syscall_64+0x2b/0x70 [ 2825.370592][T10016] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2825.376493][T10016] RIP: 0033:0x7fce18d590e9 [ 2825.380902][T10016] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2825.400560][T10016] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2825.409023][T10016] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 23:16:41 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$BTRFS_IOC_START_SYNC(r0, 0x8940, 0x0) [ 2825.416990][T10016] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2825.424955][T10016] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2825.432949][T10016] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2825.440919][T10016] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2825.448891][T10016] [ 2825.452014][T10016] memory: usage 864kB, limit 0kB, failcnt 13565 [ 2825.458343][T10016] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2825.465342][T10016] Memory cgroup stats for /syz0: [ 2825.735960][T10016] anon 0 [ 2825.735960][T10016] file 118784 [ 2825.735960][T10016] kernel 114688 [ 2825.735960][T10016] kernel_stack 0 [ 2825.735960][T10016] pagetables 0 [ 2825.735960][T10016] percpu 0 [ 2825.735960][T10016] sock 651264 [ 2825.735960][T10016] vmalloc 0 [ 2825.735960][T10016] shmem 118784 [ 2825.735960][T10016] file_mapped 118784 [ 2825.735960][T10016] file_dirty 0 [ 2825.735960][T10016] file_writeback 0 [ 2825.735960][T10016] swapcached 0 [ 2825.735960][T10016] inactive_anon 57344 [ 2825.735960][T10016] active_anon 61440 [ 2825.735960][T10016] inactive_file 0 [ 2825.735960][T10016] active_file 0 [ 2825.735960][T10016] unevictable 0 [ 2825.735960][T10016] slab_reclaimable 3256 [ 2825.735960][T10016] slab_unreclaimable 107736 [ 2825.735960][T10016] slab 110992 [ 2825.735960][T10016] workingset_refault_anon 0 [ 2825.735960][T10016] workingset_refault_file 48 [ 2825.735960][T10016] workingset_activate_anon 0 [ 2825.735960][T10016] workingset_activate_file 0 [ 2825.829771][T10016] Out of memory and no killable processes... 23:16:41 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140), 0x41, 0x0) 23:16:41 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:16:41 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000005680)={0x6, 0x3, &(0x7f0000005140)=@framed, &(0x7f00000051c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000005640)=[r0, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 23:16:41 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0x3, &(0x7f00000001c0)=@framed={{0x18, 0xa}}, &(0x7f0000000240)='syzkaller\x00', 0x1, 0x83, &(0x7f00000003c0)=""/131, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2825.836049][T10021] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2825.846356][T10021] CPU: 1 PID: 10021 Comm: syz-executor.5 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2825.856864][T10021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2825.866909][T10021] Call Trace: [ 2825.870185][T10021] [ 2825.873145][T10021] dump_stack_lvl+0xd6/0x122 [ 2825.877786][T10021] dump_stack+0x11/0x12 [ 2825.882073][T10021] dump_header+0x98/0x410 [ 2825.886387][T10021] out_of_memory+0x65e/0x880 [ 2825.890956][T10021] memory_max_write+0x31b/0x420 [ 2825.895878][T10021] ? memory_max_show+0x70/0x70 [ 2825.900621][T10021] cgroup_file_write+0x167/0x300 [ 2825.905599][T10021] ? __check_object_size+0x235/0x380 [ 2825.910921][T10021] ? cgroup_seqfile_stop+0x70/0x70 [ 2825.916080][T10021] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2825.921420][T10021] vfs_write+0x71c/0x890 [ 2825.925642][T10021] ksys_write+0xe8/0x1a0 [ 2825.929945][T10021] __x64_sys_write+0x3e/0x50 [ 2825.934591][T10021] do_syscall_64+0x2b/0x70 [ 2825.939008][T10021] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2825.944879][T10021] RIP: 0033:0x7f979ec120e9 [ 2825.949273][T10021] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2825.968975][T10021] RSP: 002b:00007f979e388168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2825.977362][T10021] RAX: ffffffffffffffda RBX: 00007f979ed24f60 RCX: 00007f979ec120e9 [ 2825.985318][T10021] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2825.993267][T10021] RBP: 00007f979ec6c08d R08: 0000000000000000 R09: 0000000000000000 [ 2826.001215][T10021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2826.009165][T10021] R13: 00007ffe624163cf R14: 00007f979e388300 R15: 0000000000022000 [ 2826.017196][T10021] [ 2826.020350][T10021] memory: usage 864kB, limit 0kB, failcnt 13565 [ 2826.026602][T10021] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2826.033427][T10021] Memory cgroup stats for /syz0: [ 2826.034723][T10021] anon 0 [ 2826.034723][T10021] file 118784 [ 2826.034723][T10021] kernel 114688 [ 2826.034723][T10021] kernel_stack 0 [ 2826.034723][T10021] pagetables 0 [ 2826.034723][T10021] percpu 0 [ 2826.034723][T10021] sock 651264 [ 2826.034723][T10021] vmalloc 0 [ 2826.034723][T10021] shmem 118784 [ 2826.034723][T10021] file_mapped 118784 [ 2826.034723][T10021] file_dirty 0 [ 2826.034723][T10021] file_writeback 0 [ 2826.034723][T10021] swapcached 0 [ 2826.034723][T10021] inactive_anon 57344 23:16:41 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_buf(r0, 0x29, 0x19, 0x0, &(0x7f0000000080)) [ 2826.034723][T10021] active_anon 61440 [ 2826.034723][T10021] inactive_file 0 [ 2826.034723][T10021] active_file 0 [ 2826.034723][T10021] unevictable 0 [ 2826.034723][T10021] slab_reclaimable 3256 [ 2826.034723][T10021] slab_unreclaimable 107736 [ 2826.034723][T10021] slab 110992 [ 2826.034723][T10021] workingset_refault_anon 0 [ 2826.034723][T10021] workingset_refault_file 48 [ 2826.034723][T10021] workingset_activate_anon 0 [ 2826.034723][T10021] workingset_activate_file 0 [ 2826.128252][T10021] Out of memory and no killable processes... 23:16:41 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000015c0)=""/188, 0xbc}], 0x1, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2826.137999][T29580] device hsr_slave_0 left promiscuous mode [ 2826.144324][T29580] device hsr_slave_1 left promiscuous mode [ 2826.152209][T29580] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2826.159656][T29580] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2826.167515][T29580] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2826.174962][T29580] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2826.183315][T29580] device bridge_slave_1 left promiscuous mode [ 2826.189526][T29580] bridge0: port 2(bridge_slave_1) entered disabled state [ 2826.197465][T29580] device bridge_slave_0 left promiscuous mode [ 2826.203598][T29580] bridge0: port 1(bridge_slave_0) entered disabled state [ 2826.214161][T29580] device veth1_macvtap left promiscuous mode [ 2826.220197][T29580] device veth0_macvtap left promiscuous mode [ 2826.226224][T29580] device veth1_vlan left promiscuous mode [ 2826.231945][T29580] device veth0_vlan left promiscuous mode [ 2826.324952][T10043] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2826.335698][T10043] CPU: 0 PID: 10043 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2826.346257][T10043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2826.356317][T10043] Call Trace: [ 2826.359598][T10043] [ 2826.362522][T10043] dump_stack_lvl+0xd6/0x122 [ 2826.367110][T10043] dump_stack+0x11/0x12 [ 2826.371267][T10043] dump_header+0x98/0x410 [ 2826.375579][T10043] out_of_memory+0x65e/0x880 [ 2826.380149][T10043] memory_max_write+0x31b/0x420 [ 2826.384986][T10043] ? memory_max_show+0x70/0x70 [ 2826.389797][T10043] cgroup_file_write+0x167/0x300 [ 2826.394760][T10043] ? __check_object_size+0x235/0x380 [ 2826.400028][T10043] ? cgroup_seqfile_stop+0x70/0x70 [ 2826.405124][T10043] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2826.410409][T10043] vfs_write+0x71c/0x890 [ 2826.414634][T10043] ksys_write+0xe8/0x1a0 [ 2826.418912][T10043] __x64_sys_write+0x3e/0x50 [ 2826.423510][T10043] do_syscall_64+0x2b/0x70 [ 2826.427909][T10043] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2826.433788][T10043] RIP: 0033:0x7fce18d590e9 [ 2826.438291][T10043] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2826.457879][T10043] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2826.466351][T10043] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2826.474315][T10043] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2826.482316][T10043] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2826.490267][T10043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2826.498221][T10043] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2826.506179][T10043] [ 2826.509572][T10043] memory: usage 864kB, limit 0kB, failcnt 13565 [ 2826.515963][T10043] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2826.522814][T10043] Memory cgroup stats for /syz0: [ 2826.523702][T10043] anon 0 [ 2826.523702][T10043] file 118784 [ 2826.523702][T10043] kernel 114688 [ 2826.523702][T10043] kernel_stack 0 [ 2826.523702][T10043] pagetables 0 [ 2826.523702][T10043] percpu 0 [ 2826.523702][T10043] sock 651264 [ 2826.523702][T10043] vmalloc 0 [ 2826.523702][T10043] shmem 118784 [ 2826.523702][T10043] file_mapped 118784 [ 2826.523702][T10043] file_dirty 0 [ 2826.523702][T10043] file_writeback 0 [ 2826.523702][T10043] swapcached 0 [ 2826.523702][T10043] inactive_anon 57344 [ 2826.523702][T10043] active_anon 61440 [ 2826.523702][T10043] inactive_file 0 [ 2826.523702][T10043] active_file 0 [ 2826.523702][T10043] unevictable 0 [ 2826.523702][T10043] slab_reclaimable 3256 [ 2826.523702][T10043] slab_unreclaimable 107736 [ 2826.523702][T10043] slab 110992 [ 2826.523702][T10043] workingset_refault_anon 0 [ 2826.523702][T10043] workingset_refault_file 48 [ 2826.523702][T10043] workingset_activate_anon 0 [ 2826.523702][T10043] workingset_activate_file 0 [ 2826.617351][T10043] Out of memory and no killable processes... [ 2826.625439][T10046] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2826.635642][T10046] CPU: 1 PID: 10046 Comm: syz-executor.5 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2826.646157][T10046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2826.656193][T10046] Call Trace: [ 2826.659460][T10046] [ 2826.662403][T10046] dump_stack_lvl+0xd6/0x122 [ 2826.666978][T10046] dump_stack+0x11/0x12 [ 2826.671111][T10046] dump_header+0x98/0x410 [ 2826.675420][T10046] out_of_memory+0x65e/0x880 [ 2826.680055][T10046] memory_max_write+0x31b/0x420 [ 2826.684959][T10046] ? memory_max_show+0x70/0x70 [ 2826.689788][T10046] cgroup_file_write+0x167/0x300 [ 2826.694771][T10046] ? __check_object_size+0x235/0x380 [ 2826.700034][T10046] ? cgroup_seqfile_stop+0x70/0x70 [ 2826.705145][T10046] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2826.710414][T10046] vfs_write+0x71c/0x890 [ 2826.714702][T10046] ksys_write+0xe8/0x1a0 [ 2826.718925][T10046] __x64_sys_write+0x3e/0x50 [ 2826.723500][T10046] do_syscall_64+0x2b/0x70 [ 2826.727899][T10046] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2826.733802][T10046] RIP: 0033:0x7f979ec120e9 [ 2826.738199][T10046] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2826.757781][T10046] RSP: 002b:00007f979e388168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2826.766175][T10046] RAX: ffffffffffffffda RBX: 00007f979ed24f60 RCX: 00007f979ec120e9 [ 2826.774153][T10046] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2826.782103][T10046] RBP: 00007f979ec6c08d R08: 0000000000000000 R09: 0000000000000000 [ 2826.790054][T10046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2826.798117][T10046] R13: 00007ffe624163cf R14: 00007f979e388300 R15: 0000000000022000 [ 2826.806114][T10046] [ 2826.809274][T10046] memory: usage 864kB, limit 0kB, failcnt 13565 [ 2826.815526][T10046] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2826.822346][T10046] Memory cgroup stats for /syz0: [ 2826.824125][T10046] anon 0 [ 2826.824125][T10046] file 118784 [ 2826.824125][T10046] kernel 114688 [ 2826.824125][T10046] kernel_stack 0 [ 2826.824125][T10046] pagetables 0 [ 2826.824125][T10046] percpu 0 [ 2826.824125][T10046] sock 651264 [ 2826.824125][T10046] vmalloc 0 [ 2826.824125][T10046] shmem 118784 [ 2826.824125][T10046] file_mapped 118784 [ 2826.824125][T10046] file_dirty 0 [ 2826.824125][T10046] file_writeback 0 [ 2826.824125][T10046] swapcached 0 [ 2826.824125][T10046] inactive_anon 57344 [ 2826.824125][T10046] active_anon 61440 [ 2826.824125][T10046] inactive_file 0 [ 2826.824125][T10046] active_file 0 [ 2826.824125][T10046] unevictable 0 [ 2826.824125][T10046] slab_reclaimable 3256 [ 2826.824125][T10046] slab_unreclaimable 107736 [ 2826.824125][T10046] slab 110992 [ 2826.824125][T10046] workingset_refault_anon 0 [ 2826.824125][T10046] workingset_refault_file 48 [ 2826.824125][T10046] workingset_activate_anon 0 [ 2826.824125][T10046] workingset_activate_file 0 [ 2826.917586][T10046] Out of memory and no killable processes... [ 2826.950551][T29580] team0 (unregistering): Port device team_slave_1 removed [ 2826.961464][T29580] team0 (unregistering): Port device team_slave_0 removed [ 2826.973376][T29580] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2826.988055][T29580] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2827.023185][T29580] bond0 (unregistering): Released all slaves [ 2827.160765][T10050] chnl_net:caif_netlink_parms(): no params data found [ 2827.195257][T10050] bridge0: port 1(bridge_slave_0) entered blocking state [ 2827.202306][T10050] bridge0: port 1(bridge_slave_0) entered disabled state [ 2827.210072][T10050] device bridge_slave_0 entered promiscuous mode [ 2827.218373][T10050] bridge0: port 2(bridge_slave_1) entered blocking state [ 2827.225518][T10050] bridge0: port 2(bridge_slave_1) entered disabled state [ 2827.233460][T10050] device bridge_slave_1 entered promiscuous mode [ 2827.249726][T10050] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2827.259957][T10050] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2827.277916][T10050] team0: Port device team_slave_0 added [ 2827.284213][T10050] team0: Port device team_slave_1 added [ 2827.300184][T10050] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2827.307220][T10050] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2827.333201][T10050] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2827.344503][T10050] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2827.351469][T10050] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2827.377682][T10050] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2827.403509][T10050] device hsr_slave_0 entered promiscuous mode [ 2827.410046][T10050] device hsr_slave_1 entered promiscuous mode [ 2827.416606][T10050] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2827.424131][T10050] Cannot create hsr debugfs directory [ 2827.452708][T10050] bridge0: port 2(bridge_slave_1) entered blocking state [ 2827.459758][T10050] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2827.466988][T10050] bridge0: port 1(bridge_slave_0) entered blocking state [ 2827.473997][T10050] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2827.500246][T10050] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2827.510887][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2827.519149][ T76] bridge0: port 1(bridge_slave_0) entered disabled state [ 2827.527103][ T76] bridge0: port 2(bridge_slave_1) entered disabled state [ 2827.538413][T10050] 8021q: adding VLAN 0 to HW filter on device team0 [ 2827.549060][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2827.557620][ T6136] bridge0: port 1(bridge_slave_0) entered blocking state [ 2827.564776][ T6136] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2827.574567][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2827.583789][T10079] bridge0: port 2(bridge_slave_1) entered blocking state [ 2827.590902][T10079] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2827.607846][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2827.616531][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2827.629529][T10050] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2827.639910][T10050] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2827.652234][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2827.660596][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2827.668931][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2827.677646][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2827.689528][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2827.697911][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2827.707404][T10050] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2827.784499][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2827.824903][T10050] device veth0_vlan entered promiscuous mode [ 2827.833542][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2827.842054][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2827.849996][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2827.858632][T10050] device veth1_vlan entered promiscuous mode [ 2827.871100][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2827.879027][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2827.887216][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2827.897682][T10050] device veth0_macvtap entered promiscuous mode [ 2827.905680][T10050] device veth1_macvtap entered promiscuous mode [ 2827.917401][T10050] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2827.927845][T10050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2827.937636][T10050] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2827.948053][T10050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2827.957865][T10050] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2827.968290][T10050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2827.978102][T10050] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2827.988585][T10050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2827.998383][T10050] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2828.008812][T10050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2828.018632][T10050] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2828.029040][T10050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2828.041791][T10050] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2828.049706][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2828.060211][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2828.069412][T10050] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2828.079984][T10050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2828.089902][T10050] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2828.100386][T10050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2828.110242][T10050] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2828.120654][T10050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2828.130512][T10050] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2828.140924][T10050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2828.150788][T10050] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2828.161220][T10050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2828.171098][T10050] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2828.181581][T10050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2828.193009][T10050] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2828.201748][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 23:16:44 executing program 0: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) lseek(r0, 0x0, 0x4) 23:16:44 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_buf(r0, 0x29, 0x24, 0x0, &(0x7f0000000080)) 23:16:44 executing program 4: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) lseek(r0, 0xffffffffffffffff, 0x4) 23:16:44 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000140), 0x6) write$bt_hci(r0, 0x0, 0xb8) 23:16:44 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:16:44 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000015c0)=""/188, 0xbc}], 0x1, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:16:44 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x400a8, &(0x7f0000000480)={[{@size={'size', 0x3d, [0x25]}}]}) 23:16:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) write(r0, 0x0, 0x0) 23:16:44 executing program 4: openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) [ 2828.314515][T10050] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2828.324516][T10050] CPU: 1 PID: 10050 Comm: syz-executor.0 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2828.335018][T10050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2828.345067][T10050] Call Trace: [ 2828.348327][T10050] [ 2828.351247][T10050] dump_stack_lvl+0xd6/0x122 [ 2828.355870][T10050] dump_stack+0x11/0x12 [ 2828.360078][T10050] dump_header+0x98/0x410 [ 2828.364481][T10050] oom_kill_process+0xfe/0x550 [ 2828.369224][T10050] out_of_memory+0x620/0x880 [ 2828.373792][T10050] mem_cgroup_oom+0x475/0x4f0 [ 2828.378523][T10050] try_charge_memcg+0x746/0x960 [ 2828.383434][T10050] obj_cgroup_charge+0x171/0x2b0 [ 2828.388354][T10050] memcg_slab_pre_alloc_hook+0xf7/0x170 [ 2828.393957][T10050] ? __d_alloc+0x3d/0x380 [ 2828.398265][T10050] kmem_cache_alloc_lru+0x76/0x2b0 [ 2828.403424][T10050] __d_alloc+0x3d/0x380 [ 2828.407620][T10050] d_alloc_parallel+0x51/0xcc0 [ 2828.412391][T10050] ? selinux_inode_permission+0x2d8/0x400 [ 2828.418098][T10050] ? selinux_inode_permission+0x335/0x400 [ 2828.423795][T10050] ? lockref_get_not_dead+0xeb/0x190 [ 2828.429059][T10050] ? __rcu_read_unlock+0x4a/0x70 [ 2828.434013][T10050] ? __down_read_common+0x16c/0x4c0 [ 2828.439263][T10050] __lookup_slow+0x80/0x250 [ 2828.443858][T10050] lookup_slow+0x3c/0x60 [ 2828.448077][T10050] walk_component+0x23d/0x280 [ 2828.452730][T10050] path_lookupat+0x11d/0x2b0 [ 2828.457296][T10050] filename_lookup+0x130/0x310 [ 2828.462061][T10050] user_path_at_empty+0x3e/0x110 [ 2828.466982][T10050] __x64_sys_umount+0x84/0xe0 [ 2828.471644][T10050] do_syscall_64+0x2b/0x70 [ 2828.476043][T10050] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2828.481985][T10050] RIP: 0033:0x7f788bb8d557 [ 2828.486436][T10050] Code: ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2828.506274][T10050] RSP: 002b:00007fff74515008 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 2828.514745][T10050] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f788bb8d557 [ 2828.522692][T10050] RDX: 00007fff745150de RSI: 000000000000000a RDI: 00007fff745150d0 [ 2828.530645][T10050] RBP: 00007fff745150d0 R08: 00000000ffffffff R09: 00007fff74514ea0 [ 2828.538609][T10050] R10: 0000555556b467c3 R11: 0000000000000246 R12: 00007f788bbe51f8 [ 2828.546591][T10050] R13: 00007fff74516190 R14: 0000555556b466f0 R15: 00007fff745161d0 [ 2828.554543][T10050] [ 2828.557587][T10050] memory: usage 920kB, limit 0kB, failcnt 13584 [ 2828.563823][T10050] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2828.570673][T10050] Memory cgroup stats for /syz0: [ 2828.570936][T10050] anon 32768 [ 2828.570936][T10050] file 118784 [ 2828.570936][T10050] kernel 139264 [ 2828.570936][T10050] kernel_stack 0 [ 2828.570936][T10050] pagetables 8192 [ 2828.570936][T10050] percpu 0 [ 2828.570936][T10050] sock 651264 [ 2828.570936][T10050] vmalloc 0 [ 2828.570936][T10050] shmem 118784 [ 2828.570936][T10050] file_mapped 118784 [ 2828.570936][T10050] file_dirty 0 [ 2828.570936][T10050] file_writeback 0 [ 2828.570936][T10050] swapcached 0 [ 2828.570936][T10050] inactive_anon 90112 [ 2828.570936][T10050] active_anon 61440 [ 2828.570936][T10050] inactive_file 0 [ 2828.570936][T10050] active_file 0 [ 2828.570936][T10050] unevictable 0 [ 2828.570936][T10050] slab_reclaimable 10752 [ 2828.570936][T10050] slab_unreclaimable 111520 [ 2828.570936][T10050] slab 122272 [ 2828.570936][T10050] workingset_refault_anon 0 [ 2828.570936][T10050] workingset_refault_file 48 [ 2828.570936][T10050] workingset_activate_anon 0 [ 2828.570936][T10050] workingset_activate_file 0 [ 2828.665040][T10050] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=10050,uid=0 [ 2828.680311][T10050] Memory cgroup out of memory: Killed process 10050 (syz-executor.0) total-vm:42336kB, anon-rss:364kB, file-rss:8192kB, shmem-rss:0kB, UID:0 pgtables:72kB oom_score_adj:0 [ 2828.702727][T10092] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2828.713208][T10092] CPU: 0 PID: 10092 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2828.723717][T10092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2828.733776][T10092] Call Trace: [ 2828.737074][T10092] [ 2828.740005][T10092] dump_stack_lvl+0xd6/0x122 [ 2828.744618][T10092] dump_stack+0x11/0x12 [ 2828.748789][T10092] dump_header+0x98/0x410 [ 2828.753112][T10092] out_of_memory+0x65e/0x880 [ 2828.757738][T10092] memory_max_write+0x31b/0x420 23:16:44 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8924, &(0x7f0000000200)={'gre0\x00', 0x0}) 23:16:44 executing program 1: r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x3, &(0x7f0000000600)=[{&(0x7f0000000140)="f5e6b9dc7752f7d13d23824af85ed8f1f96caba5f137f243da0cfbfe3a7d6579459a566acee56421a7c1702d85f41d222a1c7f4150da4e5cc6a310bb47856f8ca0e2ae98a5efc61da43acfacbd7e12c3f62f443186f4e8656fe62d14afb61861d417cfe935c28fb5a6f33766da45bc0676d4c7bf5a5fc68d8779a49e2463c39722286233739e12d8c58736b6a3a8c03ef48ce62e37f13248204d1e9cba75dfeb354a3dffff28c0bfe0fb97e52ac2d352776533", 0xb3, 0x800}, {&(0x7f0000000200)="09dd00ce9f6d2335fcf863cccdbc7e079c2e61135601eb22943eed429e59e5a98f9ae3cc86e49635557fac6ff3d5e3f15059b225ddcc4a4badecb8ccc6d4fa644df7b028e2f16fdb27f34a6dec44397db78daae1e9390ca32db567de1319e2e74f104031f8e084b808ca67b7886555ab85e46055bc25495242b398278c4fdc550381ba6e3e050ae123e23aed409a7965a67619e9b7913533d5d507db914954d73114d29caf2f8e7096ce6c1996826fcf819959fc1b95d4435c882541521d54db72a05483a4334a93a2da5801f87487dbe667f8d50241218f6c", 0xd9, 0xfffffffc}, {0x0}], 0x35000, &(0x7f0000000680)={[{@uid={'uid', 0x3d, 0xee01}}, {@huge_never}, {@nr_blocks={'nr_blocks', 0x3d, [0x32, 0x7, 0x0]}}, {@mpol={'mpol', 0x3d, {'local', '=relative', @void}}}, {@mode}], [{@permit_directio}, {@uid_gt={'uid>', 0xee01}}, {@smackfshat}]}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000900)={0xffffffffffffffff, r0, 0x401}) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x54, 0x0, 0x300, 0x70bd2b, 0x25dfdbff, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0202}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x24000080}, 0x20000040) 23:16:44 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000380)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @private1}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=ANY=[], 0xf}}], 0x1, 0x0) [ 2828.762615][T10092] ? memory_max_show+0x70/0x70 [ 2828.767375][T10092] cgroup_file_write+0x167/0x300 [ 2828.772413][T10092] ? __check_object_size+0x235/0x380 [ 2828.777696][T10092] ? cgroup_seqfile_stop+0x70/0x70 [ 2828.782802][T10092] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2828.788097][T10092] vfs_write+0x71c/0x890 [ 2828.792378][T10092] ksys_write+0xe8/0x1a0 [ 2828.796643][T10092] __x64_sys_write+0x3e/0x50 [ 2828.801238][T10092] do_syscall_64+0x2b/0x70 [ 2828.805705][T10092] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2828.811707][T10092] RIP: 0033:0x7fce18d590e9 [ 2828.816102][T10092] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2828.835708][T10092] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2828.844118][T10092] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2828.852092][T10092] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2828.860057][T10092] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2828.868162][T10092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2828.876135][T10092] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2828.884110][T10092] [ 2828.887160][T10092] memory: usage 872kB, limit 0kB, failcnt 13601 [ 2828.893618][T10092] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2828.900566][T10092] Memory cgroup stats for /syz0: [ 2828.905695][T10092] anon 0 [ 2828.905695][T10092] file 118784 [ 2828.905695][T10092] kernel 122880 [ 2828.905695][T10092] kernel_stack 0 [ 2828.905695][T10092] pagetables 0 [ 2828.905695][T10092] percpu 0 [ 2828.905695][T10092] sock 651264 [ 2828.905695][T10092] vmalloc 0 [ 2828.905695][T10092] shmem 118784 [ 2828.905695][T10092] file_mapped 118784 [ 2828.905695][T10092] file_dirty 0 [ 2828.905695][T10092] file_writeback 0 [ 2828.905695][T10092] swapcached 0 [ 2828.905695][T10092] inactive_anon 57344 [ 2828.905695][T10092] active_anon 61440 [ 2828.905695][T10092] inactive_file 0 [ 2828.905695][T10092] active_file 0 [ 2828.905695][T10092] unevictable 0 [ 2828.905695][T10092] slab_reclaimable 6424 [ 2828.905695][T10092] slab_unreclaimable 111280 [ 2828.905695][T10092] slab 117704 [ 2828.905695][T10092] workingset_refault_anon 0 [ 2828.905695][T10092] workingset_refault_file 48 [ 2828.905695][T10092] workingset_activate_anon 0 [ 2828.905695][T10092] workingset_activate_file 0 [ 2828.999364][T10092] Out of memory and no killable processes... [ 2829.006783][T10099] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2829.017025][T10099] CPU: 1 PID: 10099 Comm: syz-executor.5 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2829.027580][T10099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2829.037615][T10099] Call Trace: [ 2829.040874][T10099] [ 2829.043780][T10099] dump_stack_lvl+0xd6/0x122 [ 2829.048355][T10099] dump_stack+0x11/0x12 [ 2829.052489][T10099] dump_header+0x98/0x410 [ 2829.056866][T10099] out_of_memory+0x65e/0x880 [ 2829.061434][T10099] memory_max_write+0x31b/0x420 [ 2829.066346][T10099] ? memory_max_show+0x70/0x70 [ 2829.071088][T10099] cgroup_file_write+0x167/0x300 [ 2829.076080][T10099] ? __check_object_size+0x235/0x380 [ 2829.081382][T10099] ? cgroup_seqfile_stop+0x70/0x70 [ 2829.086472][T10099] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2829.091737][T10099] vfs_write+0x71c/0x890 [ 2829.095971][T10099] ksys_write+0xe8/0x1a0 [ 2829.100275][T10099] __x64_sys_write+0x3e/0x50 [ 2829.104847][T10099] do_syscall_64+0x2b/0x70 [ 2829.109243][T10099] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2829.115116][T10099] RIP: 0033:0x7f979ec120e9 [ 2829.119505][T10099] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2829.139088][T10099] RSP: 002b:00007f979e367168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2829.147480][T10099] RAX: ffffffffffffffda RBX: 00007f979ed25030 RCX: 00007f979ec120e9 [ 2829.155430][T10099] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2829.163379][T10099] RBP: 00007f979ec6c08d R08: 0000000000000000 R09: 0000000000000000 [ 2829.171329][T10099] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2829.179340][T10099] R13: 00007ffe624163cf R14: 00007f979e367300 R15: 0000000000022000 [ 2829.187334][T10099] [ 2829.190503][T10099] memory: usage 872kB, limit 0kB, failcnt 13601 [ 2829.196805][T10099] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2829.203623][T10099] Memory cgroup stats for /syz0: [ 2829.204126][T10099] anon 0 [ 2829.204126][T10099] file 118784 [ 2829.204126][T10099] kernel 122880 [ 2829.204126][T10099] kernel_stack 0 [ 2829.204126][T10099] pagetables 0 [ 2829.204126][T10099] percpu 0 [ 2829.204126][T10099] sock 651264 [ 2829.204126][T10099] vmalloc 0 [ 2829.204126][T10099] shmem 118784 [ 2829.204126][T10099] file_mapped 118784 [ 2829.204126][T10099] file_dirty 0 [ 2829.204126][T10099] file_writeback 0 [ 2829.204126][T10099] swapcached 0 [ 2829.204126][T10099] inactive_anon 57344 [ 2829.204126][T10099] active_anon 61440 [ 2829.204126][T10099] inactive_file 0 [ 2829.204126][T10099] active_file 0 [ 2829.204126][T10099] unevictable 0 23:16:45 executing program 0: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) lseek(r0, 0x0, 0x4) 23:16:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @remote}}}}) 23:16:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8971, &(0x7f0000000080)={'ip_vti0\x00', 0x0}) 23:16:45 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, 0x0, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x12) 23:16:45 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000015c0)=""/188, 0xbc}], 0x1, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:16:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x13) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x4, 0x9, 0x0, 0x114, 0xffffffffffffffff, 0x41, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x3}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e21, 0x7, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c) ioctl$USBDEVFS_DROP_PRIVILEGES(0xffffffffffffffff, 0x4004551e, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x0, 0x0, 0x7fff, 0x0, 0xb3550aa4ba878354}, 0x9c) 23:16:45 executing program 0: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) lseek(r0, 0x0, 0x4) [ 2829.204126][T10099] slab_reclaimable 6424 [ 2829.204126][T10099] slab_unreclaimable 111280 [ 2829.204126][T10099] slab 117704 [ 2829.204126][T10099] workingset_refault_anon 0 [ 2829.204126][T10099] workingset_refault_file 48 [ 2829.204126][T10099] workingset_activate_anon 0 [ 2829.204126][T10099] workingset_activate_file 0 [ 2829.297566][T10099] Out of memory and no killable processes... 23:16:45 executing program 1: syz_open_dev$sg(&(0x7f0000000300), 0x0, 0xc8182) 23:16:45 executing program 4: syz_io_uring_setup(0x5d32, &(0x7f0000000440)={0x0, 0x0, 0x2, 0x0, 0x3b6}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000004c0), &(0x7f0000000500)) 23:16:45 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)=ANY=[]) [ 2829.520603][T10117] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2829.530997][T10117] CPU: 0 PID: 10117 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2829.541501][T10117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2829.544916][T10130] program syz-executor.1 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 2829.551552][T10117] Call Trace: [ 2829.551563][T10117] 23:16:45 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000000)={@local, @local, @void, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @dev, @local}, {{0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0xa, 0x0, "48fd88", 0x0, "deba45"}}}}}}, 0x0) 23:16:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x4020940d, 0x0) [ 2829.551571][T10117] dump_stack_lvl+0xd6/0x122 [ 2829.551599][T10117] dump_stack+0x11/0x12 [ 2829.576015][T10117] dump_header+0x98/0x410 [ 2829.580351][T10117] out_of_memory+0x65e/0x880 [ 2829.584968][T10117] memory_max_write+0x31b/0x420 [ 2829.589834][T10117] ? memory_max_show+0x70/0x70 [ 2829.594606][T10117] cgroup_file_write+0x167/0x300 [ 2829.599552][T10117] ? __check_object_size+0x235/0x380 [ 2829.604868][T10117] ? cgroup_seqfile_stop+0x70/0x70 [ 2829.610032][T10117] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2829.615410][T10117] vfs_write+0x71c/0x890 [ 2829.619816][T10117] ksys_write+0xe8/0x1a0 [ 2829.624065][T10117] __x64_sys_write+0x3e/0x50 [ 2829.628681][T10117] do_syscall_64+0x2b/0x70 [ 2829.633145][T10117] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2829.639063][T10117] RIP: 0033:0x7fce18d590e9 [ 2829.643472][T10117] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2829.663079][T10117] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2829.671492][T10117] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2829.679467][T10117] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2829.687440][T10117] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2829.695414][T10117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2829.703390][T10117] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2829.711373][T10117] [ 2829.715575][T10117] memory: usage 864kB, limit 0kB, failcnt 13601 [ 2829.721985][T10117] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2829.728965][T10117] Memory cgroup stats for /syz0: [ 2829.729253][T10132] dccp_invalid_packet: invalid packet type [ 2829.740906][T10117] anon 0 [ 2829.740906][T10117] file 118784 [ 2829.740906][T10117] kernel 114688 [ 2829.740906][T10117] kernel_stack 0 [ 2829.740906][T10117] pagetables 0 [ 2829.740906][T10117] percpu 0 [ 2829.740906][T10117] sock 651264 [ 2829.740906][T10117] vmalloc 0 [ 2829.740906][T10117] shmem 118784 [ 2829.740906][T10117] file_mapped 118784 [ 2829.740906][T10117] file_dirty 0 [ 2829.740906][T10117] file_writeback 0 [ 2829.740906][T10117] swapcached 0 [ 2829.740906][T10117] inactive_anon 57344 [ 2829.740906][T10117] active_anon 61440 [ 2829.740906][T10117] inactive_file 0 [ 2829.740906][T10117] active_file 0 [ 2829.740906][T10117] unevictable 0 [ 2829.740906][T10117] slab_reclaimable 5048 [ 2829.740906][T10117] slab_unreclaimable 107736 [ 2829.740906][T10117] slab 112784 [ 2829.740906][T10117] workingset_refault_anon 0 [ 2829.740906][T10117] workingset_refault_file 48 23:16:45 executing program 1: add_key(&(0x7f0000000140)='rxrpc\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 23:16:45 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000015c0)=""/188, 0xbc}], 0x1, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:16:45 executing program 4: syz_open_dev$rtc(0x0, 0x0, 0x0) r0 = openat$rtc(0xffffff9c, &(0x7f0000000080), 0x400, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) 23:16:45 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, 0x0, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x12) [ 2829.740906][T10117] workingset_activate_anon 0 [ 2829.740906][T10117] workingset_activate_file 0 [ 2829.829765][T10117] Out of memory and no killable processes... 23:16:45 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000000)={@local, @local, @void, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2c, 0x0, @dev, @local}, {{0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, "48fd88", 0x0, "deba45"}}}}}}, 0x0) [ 2830.052927][T10145] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2830.063302][T10145] CPU: 0 PID: 10145 Comm: syz-executor.5 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2830.073803][T10145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2830.083860][T10145] Call Trace: [ 2830.087211][T10145] [ 2830.090155][T10145] dump_stack_lvl+0xd6/0x122 [ 2830.094772][T10145] dump_stack+0x11/0x12 [ 2830.098942][T10145] dump_header+0x98/0x410 [ 2830.103283][T10145] out_of_memory+0x65e/0x880 [ 2830.107882][T10145] memory_max_write+0x31b/0x420 [ 2830.112809][T10145] ? memory_max_show+0x70/0x70 [ 2830.117583][T10145] cgroup_file_write+0x167/0x300 [ 2830.122597][T10145] ? __check_object_size+0x235/0x380 [ 2830.127890][T10145] ? cgroup_seqfile_stop+0x70/0x70 [ 2830.133070][T10145] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2830.138369][T10145] vfs_write+0x71c/0x890 [ 2830.142695][T10145] ksys_write+0xe8/0x1a0 [ 2830.146939][T10145] __x64_sys_write+0x3e/0x50 [ 2830.151579][T10145] do_syscall_64+0x2b/0x70 [ 2830.155976][T10145] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2830.161873][T10145] RIP: 0033:0x7f979ec120e9 [ 2830.166281][T10145] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2830.185907][T10145] RSP: 002b:00007f979e388168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2830.194305][T10145] RAX: ffffffffffffffda RBX: 00007f979ed24f60 RCX: 00007f979ec120e9 [ 2830.202259][T10145] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2830.210274][T10145] RBP: 00007f979ec6c08d R08: 0000000000000000 R09: 0000000000000000 [ 2830.218297][T10145] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2830.226246][T10145] R13: 00007ffe624163cf R14: 00007f979e388300 R15: 0000000000022000 [ 2830.234333][T10145] [ 2830.237467][T10145] memory: usage 864kB, limit 0kB, failcnt 13601 [ 2830.243699][T10145] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 23:16:46 executing program 2: socket(0xa, 0x3, 0x5c) [ 2830.250550][T10145] Memory cgroup stats for /syz0: [ 2830.252218][T10145] anon 0 [ 2830.252218][T10145] file 118784 [ 2830.252218][T10145] kernel 114688 [ 2830.252218][T10145] kernel_stack 0 [ 2830.252218][T10145] pagetables 0 [ 2830.252218][T10145] percpu 0 [ 2830.252218][T10145] sock 651264 [ 2830.252218][T10145] vmalloc 0 [ 2830.252218][T10145] shmem 118784 [ 2830.252218][T10145] file_mapped 118784 [ 2830.252218][T10145] file_dirty 0 [ 2830.252218][T10145] file_writeback 0 [ 2830.252218][T10145] swapcached 0 [ 2830.252218][T10145] inactive_anon 57344 [ 2830.252218][T10145] active_anon 61440 [ 2830.252218][T10145] inactive_file 0 [ 2830.252218][T10145] active_file 0 [ 2830.252218][T10145] unevictable 0 [ 2830.252218][T10145] slab_reclaimable 5048 [ 2830.252218][T10145] slab_unreclaimable 107736 [ 2830.252218][T10145] slab 112784 [ 2830.252218][T10145] workingset_refault_anon 0 [ 2830.252218][T10145] workingset_refault_file 48 [ 2830.252218][T10145] workingset_activate_anon 0 [ 2830.252218][T10145] workingset_activate_file 0 [ 2830.345720][T10145] Out of memory and no killable processes... [ 2830.351925][T10151] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2830.362285][T10151] CPU: 1 PID: 10151 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2830.372902][T10151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2830.382951][T10151] Call Trace: [ 2830.386210][T10151] [ 2830.389121][T10151] dump_stack_lvl+0xd6/0x122 [ 2830.393698][T10151] dump_stack+0x11/0x12 [ 2830.397848][T10151] dump_header+0x98/0x410 [ 2830.402158][T10151] out_of_memory+0x65e/0x880 [ 2830.406794][T10151] memory_max_write+0x31b/0x420 [ 2830.411648][T10151] ? memory_max_show+0x70/0x70 [ 2830.416413][T10151] cgroup_file_write+0x167/0x300 [ 2830.421351][T10151] ? cgroup_seqfile_stop+0x70/0x70 [ 2830.426514][T10151] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2830.431860][T10151] vfs_write+0x71c/0x890 [ 2830.436090][T10151] ksys_write+0xe8/0x1a0 [ 2830.440311][T10151] __x64_sys_write+0x3e/0x50 [ 2830.444881][T10151] do_syscall_64+0x2b/0x70 [ 2830.449309][T10151] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2830.455181][T10151] RIP: 0033:0x7fce18d590e9 [ 2830.459572][T10151] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2830.479162][T10151] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2830.487571][T10151] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2830.495521][T10151] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2830.503510][T10151] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2830.511466][T10151] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2830.519415][T10151] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2830.527367][T10151] [ 2830.530405][T10151] memory: usage 864kB, limit 0kB, failcnt 13601 [ 2830.536683][T10151] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2830.543553][T10151] Memory cgroup stats for /syz0: [ 2830.547452][T10151] anon 0 [ 2830.547452][T10151] file 118784 [ 2830.547452][T10151] kernel 114688 [ 2830.547452][T10151] kernel_stack 0 [ 2830.547452][T10151] pagetables 0 [ 2830.547452][T10151] percpu 0 [ 2830.547452][T10151] sock 651264 [ 2830.547452][T10151] vmalloc 0 [ 2830.547452][T10151] shmem 118784 [ 2830.547452][T10151] file_mapped 118784 [ 2830.547452][T10151] file_dirty 0 [ 2830.547452][T10151] file_writeback 0 [ 2830.547452][T10151] swapcached 0 [ 2830.547452][T10151] inactive_anon 57344 [ 2830.547452][T10151] active_anon 61440 [ 2830.547452][T10151] inactive_file 0 [ 2830.547452][T10151] active_file 0 [ 2830.547452][T10151] unevictable 0 [ 2830.547452][T10151] slab_reclaimable 5048 [ 2830.547452][T10151] slab_unreclaimable 107736 [ 2830.547452][T10151] slab 112784 [ 2830.547452][T10151] workingset_refault_anon 0 [ 2830.547452][T10151] workingset_refault_file 48 [ 2830.547452][T10151] workingset_activate_anon 0 [ 2830.547452][T10151] workingset_activate_file 0 [ 2830.547782][T20545] device hsr_slave_0 left promiscuous mode [ 2830.552563][T10151] Out of memory and no killable processes... [ 2830.653656][T20545] device hsr_slave_1 left promiscuous mode [ 2830.660528][T20545] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2830.667965][T20545] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2830.675735][T20545] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2830.683210][T20545] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2830.690978][T20545] device bridge_slave_1 left promiscuous mode [ 2830.697153][T20545] bridge0: port 2(bridge_slave_1) entered disabled state [ 2830.704694][T20545] device bridge_slave_0 left promiscuous mode [ 2830.710846][T20545] bridge0: port 1(bridge_slave_0) entered disabled state [ 2830.721194][T20545] device veth1_macvtap left promiscuous mode [ 2830.727211][T20545] device veth0_macvtap left promiscuous mode [ 2830.733198][T20545] device veth1_vlan left promiscuous mode [ 2830.739073][T20545] device veth0_vlan left promiscuous mode [ 2830.823806][T20545] team0 (unregistering): Port device team_slave_1 removed [ 2830.837672][T20545] team0 (unregistering): Port device team_slave_0 removed [ 2830.848901][T20545] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2830.860601][T20545] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2830.890033][T20545] bond0 (unregistering): Released all slaves [ 2831.303919][T10155] chnl_net:caif_netlink_parms(): no params data found [ 2831.333159][T10155] bridge0: port 1(bridge_slave_0) entered blocking state [ 2831.340271][T10155] bridge0: port 1(bridge_slave_0) entered disabled state [ 2831.348200][T10155] device bridge_slave_0 entered promiscuous mode [ 2831.355641][T10155] bridge0: port 2(bridge_slave_1) entered blocking state [ 2831.362686][T10155] bridge0: port 2(bridge_slave_1) entered disabled state [ 2831.370271][T10155] device bridge_slave_1 entered promiscuous mode [ 2831.386203][T10155] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2831.396597][T10155] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2831.414573][T10155] team0: Port device team_slave_0 added [ 2831.421318][T10155] team0: Port device team_slave_1 added [ 2831.435124][T10155] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2831.442046][T10155] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2831.467944][T10155] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2831.479109][T10155] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2831.486057][T10155] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2831.511994][T10155] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2831.533706][T10155] device hsr_slave_0 entered promiscuous mode [ 2831.540638][T10155] device hsr_slave_1 entered promiscuous mode [ 2831.547115][T10155] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2831.554640][T10155] Cannot create hsr debugfs directory [ 2831.581801][T10155] bridge0: port 2(bridge_slave_1) entered blocking state [ 2831.588847][T10155] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2831.596176][T10155] bridge0: port 1(bridge_slave_0) entered blocking state [ 2831.603253][T10155] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2831.629103][T10155] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2831.639729][ T1995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2831.649097][ T1995] bridge0: port 1(bridge_slave_0) entered disabled state [ 2831.656846][ T1995] bridge0: port 2(bridge_slave_1) entered disabled state [ 2831.668692][T10155] 8021q: adding VLAN 0 to HW filter on device team0 [ 2831.678349][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2831.687919][T20403] bridge0: port 1(bridge_slave_0) entered blocking state [ 2831.694932][T20403] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2831.713644][T10155] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2831.723985][T10155] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2831.737576][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2831.746120][T20403] bridge0: port 2(bridge_slave_1) entered blocking state [ 2831.753201][T20403] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2831.761932][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2831.770665][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2831.779157][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2831.787611][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2831.796131][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2831.803725][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2831.816560][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2831.823904][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2831.834222][T10155] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2831.913278][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2831.960322][T10155] device veth0_vlan entered promiscuous mode [ 2831.967881][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2831.976167][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2831.987597][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2831.995284][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2832.003704][T10155] device veth1_vlan entered promiscuous mode [ 2832.015920][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2832.023852][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2832.033028][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2832.041515][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2832.051961][T10155] device veth0_macvtap entered promiscuous mode [ 2832.060766][T10155] device veth1_macvtap entered promiscuous mode [ 2832.071698][T10155] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2832.082210][T10155] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2832.092176][T10155] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2832.102776][T10155] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2832.112650][T10155] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2832.123067][T10155] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2832.132986][T10155] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2832.143412][T10155] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2832.153232][T10155] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2832.163659][T10155] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2832.173516][T10155] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2832.183938][T10155] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2832.195008][T10155] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2832.202922][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2832.211039][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2832.219030][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2832.227795][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2832.238132][T10155] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2832.248599][T10155] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2832.258385][T10155] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2832.268780][T10155] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2832.278584][T10155] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2832.288983][T10155] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2832.298798][T10155] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2832.309287][T10155] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2832.319127][T10155] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2832.329686][T10155] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2832.339562][T10155] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2832.350099][T10155] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2832.361556][T10155] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2832.369712][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2832.379513][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 23:16:48 executing program 1: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f00000004c0), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000006c0)={0x20, r0, 0x1, 0x0, 0x0, {0x11}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}}, 0x0) 23:16:48 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip_vti0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x4, 0x0, @loopback, @loopback}}}}) 23:16:48 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007ffb) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r3, r1, 0x0, 0x800100022007) 23:16:48 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000015c0)=""/188, 0xbc}], 0x1, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:16:48 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, 0x0, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x12) 23:16:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x13) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e21, 0x7, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x0, 0x0, 0x7fff, 0x0, 0xb3550aa4ba878354}, 0x9c) 23:16:48 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0xc0189436, &(0x7f0000000200)={'gre0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @remote}}}}) 23:16:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000003b00)={0x0, 0x31, &(0x7f0000003ac0)={&(0x7f0000000400)={0x28, r1, 0x203, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}]}]}, 0x28}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) [ 2832.479952][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2832.513639][T10198] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2832.524193][T10198] CPU: 1 PID: 10198 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2832.534765][T10198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2832.544820][T10198] Call Trace: [ 2832.548149][T10198] [ 2832.551129][T10198] dump_stack_lvl+0xd6/0x122 [ 2832.555747][T10198] dump_stack+0x11/0x12 [ 2832.559958][T10198] dump_header+0x98/0x410 [ 2832.564364][T10198] oom_kill_process+0xfe/0x550 [ 2832.569124][T10198] out_of_memory+0x620/0x880 [ 2832.573774][T10198] memory_max_write+0x31b/0x420 [ 2832.578627][T10198] ? memory_max_show+0x70/0x70 [ 2832.583393][T10198] cgroup_file_write+0x167/0x300 [ 2832.588333][T10198] ? __check_object_size+0x235/0x380 [ 2832.593617][T10198] ? cgroup_seqfile_stop+0x70/0x70 [ 2832.598731][T10198] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2832.604076][T10198] vfs_write+0x71c/0x890 [ 2832.608322][T10198] ksys_write+0xe8/0x1a0 [ 2832.612638][T10198] __x64_sys_write+0x3e/0x50 [ 2832.617234][T10198] do_syscall_64+0x2b/0x70 [ 2832.621689][T10198] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2832.627661][T10198] RIP: 0033:0x7fce18d590e9 [ 2832.632068][T10198] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2832.651681][T10198] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2832.660165][T10198] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2832.668227][T10198] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2832.676245][T10198] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2832.684211][T10198] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2832.692203][T10198] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2832.700229][T10198] [ 2832.703858][T10198] memory: usage 920kB, limit 0kB, failcnt 13601 [ 2832.710198][T10198] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2832.717117][T10198] Memory cgroup stats for /syz0: [ 2832.722180][T10198] anon 32768 [ 2832.722180][T10198] file 118784 [ 2832.722180][T10198] kernel 139264 [ 2832.722180][T10198] kernel_stack 0 [ 2832.722180][T10198] pagetables 8192 [ 2832.722180][T10198] percpu 0 [ 2832.722180][T10198] sock 651264 [ 2832.722180][T10198] vmalloc 0 [ 2832.722180][T10198] shmem 118784 [ 2832.722180][T10198] file_mapped 118784 [ 2832.722180][T10198] file_dirty 0 [ 2832.722180][T10198] file_writeback 0 [ 2832.722180][T10198] swapcached 0 [ 2832.722180][T10198] inactive_anon 90112 [ 2832.722180][T10198] active_anon 61440 [ 2832.722180][T10198] inactive_file 0 [ 2832.722180][T10198] active_file 0 [ 2832.722180][T10198] unevictable 0 [ 2832.722180][T10198] slab_reclaimable 9176 [ 2832.722180][T10198] slab_unreclaimable 111520 [ 2832.722180][T10198] slab 120696 [ 2832.722180][T10198] workingset_refault_anon 0 [ 2832.722180][T10198] workingset_refault_file 48 [ 2832.722180][T10198] workingset_activate_anon 0 [ 2832.722180][T10198] workingset_activate_file 0 [ 2832.816969][T10198] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=10155,uid=0 [ 2832.832588][T10198] Memory cgroup out of memory: Killed process 10155 (syz-executor.0) total-vm:42336kB, anon-rss:360kB, file-rss:8192kB, shmem-rss:0kB, UID:0 pgtables:72kB oom_score_adj:0 [ 2832.860417][T10198] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2832.871218][T10198] CPU: 0 PID: 10198 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2832.881761][T10198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2832.891813][T10198] Call Trace: [ 2832.895080][T10198] [ 2832.897997][T10198] dump_stack_lvl+0xd6/0x122 [ 2832.902591][T10198] dump_stack+0x11/0x12 [ 2832.906820][T10198] dump_header+0x98/0x410 [ 2832.911185][T10198] out_of_memory+0x65e/0x880 [ 2832.915777][T10198] memory_max_write+0x31b/0x420 [ 2832.920672][T10198] ? memory_max_show+0x70/0x70 [ 2832.925437][T10198] cgroup_file_write+0x167/0x300 [ 2832.930377][T10198] ? __check_object_size+0x235/0x380 [ 2832.935658][T10198] ? cgroup_seqfile_stop+0x70/0x70 [ 2832.940788][T10198] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2832.946192][T10198] vfs_write+0x71c/0x890 [ 2832.950440][T10198] ksys_write+0xe8/0x1a0 [ 2832.954683][T10198] __x64_sys_write+0x3e/0x50 [ 2832.959295][T10198] do_syscall_64+0x2b/0x70 [ 2832.963763][T10198] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2832.969682][T10198] RIP: 0033:0x7fce18d590e9 [ 2832.974178][T10198] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2832.993966][T10198] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2833.002386][T10198] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2833.010353][T10198] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2833.018330][T10198] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2833.026345][T10198] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2833.034313][T10198] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2833.042351][T10198] [ 2833.045385][T10198] memory: usage 876kB, limit 0kB, failcnt 13601 [ 2833.051698][T10198] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2833.058807][T10198] Memory cgroup stats for /syz0: [ 2833.066820][T10198] anon 0 [ 2833.066820][T10198] file 118784 [ 2833.066820][T10198] kernel 126976 [ 2833.066820][T10198] kernel_stack 0 [ 2833.066820][T10198] pagetables 0 [ 2833.066820][T10198] percpu 0 [ 2833.066820][T10198] sock 651264 [ 2833.066820][T10198] vmalloc 0 [ 2833.066820][T10198] shmem 118784 [ 2833.066820][T10198] file_mapped 118784 [ 2833.066820][T10198] file_dirty 0 [ 2833.066820][T10198] file_writeback 0 [ 2833.066820][T10198] swapcached 0 [ 2833.066820][T10198] inactive_anon 57344 [ 2833.066820][T10198] active_anon 61440 [ 2833.066820][T10198] inactive_file 0 [ 2833.066820][T10198] active_file 0 [ 2833.066820][T10198] unevictable 0 [ 2833.066820][T10198] slab_reclaimable 7600 [ 2833.066820][T10198] slab_unreclaimable 111280 [ 2833.066820][T10198] slab 118880 [ 2833.066820][T10198] workingset_refault_anon 0 [ 2833.066820][T10198] workingset_refault_file 48 [ 2833.066820][T10198] workingset_activate_anon 0 [ 2833.066820][T10198] workingset_activate_file 0 [ 2833.160761][T10198] Out of memory and no killable processes... [ 2833.179145][T10199] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2833.189529][T10199] CPU: 1 PID: 10199 Comm: syz-executor.5 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2833.200028][T10199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2833.210155][T10199] Call Trace: [ 2833.213431][T10199] [ 2833.216355][T10199] dump_stack_lvl+0xd6/0x122 [ 2833.220998][T10199] dump_stack+0x11/0x12 [ 2833.225154][T10199] dump_header+0x98/0x410 [ 2833.229495][T10199] out_of_memory+0x65e/0x880 [ 2833.234202][T10199] memory_max_write+0x31b/0x420 [ 2833.239076][T10199] ? memory_max_show+0x70/0x70 [ 2833.243854][T10199] cgroup_file_write+0x167/0x300 [ 2833.248800][T10199] ? __check_object_size+0x235/0x380 [ 2833.254090][T10199] ? cgroup_seqfile_stop+0x70/0x70 [ 2833.259215][T10199] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2833.264537][T10199] vfs_write+0x71c/0x890 [ 2833.268786][T10199] ksys_write+0xe8/0x1a0 [ 2833.273029][T10199] __x64_sys_write+0x3e/0x50 [ 2833.277678][T10199] do_syscall_64+0x2b/0x70 [ 2833.282096][T10199] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2833.288077][T10199] RIP: 0033:0x7f979ec120e9 [ 2833.292489][T10199] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2833.312184][T10199] RSP: 002b:00007f979e388168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2833.320714][T10199] RAX: ffffffffffffffda RBX: 00007f979ed24f60 RCX: 00007f979ec120e9 23:16:49 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0x0, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:16:49 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007ffb) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r3, r1, 0x0, 0x800100022007) [ 2833.328672][T10199] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2833.336703][T10199] RBP: 00007f979ec6c08d R08: 0000000000000000 R09: 0000000000000000 [ 2833.344653][T10199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2833.352612][T10199] R13: 00007ffe624163cf R14: 00007f979e388300 R15: 0000000000022000 [ 2833.360569][T10199] [ 2833.363865][T10199] memory: usage 872kB, limit 0kB, failcnt 13601 [ 2833.370134][T10199] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2833.376996][T10199] Memory cgroup stats for /syz0: [ 2833.379172][T10199] anon 0 [ 2833.379172][T10199] file 118784 [ 2833.379172][T10199] kernel 122880 [ 2833.379172][T10199] kernel_stack 0 [ 2833.379172][T10199] pagetables 0 [ 2833.379172][T10199] percpu 0 [ 2833.379172][T10199] sock 651264 [ 2833.379172][T10199] vmalloc 0 [ 2833.379172][T10199] shmem 118784 [ 2833.379172][T10199] file_mapped 118784 [ 2833.379172][T10199] file_dirty 0 [ 2833.379172][T10199] file_writeback 0 [ 2833.379172][T10199] swapcached 0 [ 2833.379172][T10199] inactive_anon 57344 [ 2833.379172][T10199] active_anon 61440 23:16:49 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000015c0)=""/188, 0xbc}], 0x1, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2833.379172][T10199] inactive_file 0 [ 2833.379172][T10199] active_file 0 [ 2833.379172][T10199] unevictable 0 [ 2833.379172][T10199] slab_reclaimable 6424 [ 2833.379172][T10199] slab_unreclaimable 111280 [ 2833.379172][T10199] slab 117704 [ 2833.379172][T10199] workingset_refault_anon 0 [ 2833.379172][T10199] workingset_refault_file 48 [ 2833.379172][T10199] workingset_activate_anon 0 [ 2833.379172][T10199] workingset_activate_file 0 [ 2833.472632][T10199] Out of memory and no killable processes... 23:16:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8910, &(0x7f0000000200)={'gre0\x00', 0x0}) 23:16:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000000)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @broadcast}}}}) 23:16:49 executing program 2: add_key(&(0x7f0000000080)='asymmetric\x00', 0x0, &(0x7f0000000140)="ee", 0x1, 0xfffffffffffffffd) 23:16:49 executing program 1: add_key(&(0x7f0000000500)='big_key\x00', &(0x7f0000000540)={'syz', 0x0}, &(0x7f0000000580)='x', 0x1, 0xfffffffffffffffe) 23:16:49 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, 0x0) 23:16:49 executing program 1: add_key(&(0x7f0000000080)='asymmetric\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 2833.722070][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2833.771146][T10218] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2833.781853][T10218] CPU: 1 PID: 10218 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2833.792382][T10218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2833.802461][T10218] Call Trace: [ 2833.805736][T10218] [ 2833.808680][T10218] dump_stack_lvl+0xd6/0x122 [ 2833.813312][T10218] dump_stack+0x11/0x12 [ 2833.817535][T10218] dump_header+0x98/0x410 [ 2833.821884][T10218] out_of_memory+0x65e/0x880 [ 2833.826477][T10218] memory_max_write+0x31b/0x420 [ 2833.831333][T10218] ? memory_max_show+0x70/0x70 [ 2833.836186][T10218] cgroup_file_write+0x167/0x300 [ 2833.841186][T10218] ? __check_object_size+0x235/0x380 [ 2833.846472][T10218] ? cgroup_seqfile_stop+0x70/0x70 [ 2833.851673][T10218] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2833.856996][T10218] vfs_write+0x71c/0x890 [ 2833.861320][T10218] ksys_write+0xe8/0x1a0 [ 2833.865569][T10218] __x64_sys_write+0x3e/0x50 [ 2833.870197][T10218] do_syscall_64+0x2b/0x70 [ 2833.874666][T10218] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2833.880567][T10218] RIP: 0033:0x7fce18d590e9 [ 2833.885036][T10218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2833.904639][T10218] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2833.913113][T10218] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2833.921088][T10218] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2833.929106][T10218] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2833.937086][T10218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2833.945177][T10218] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2833.953184][T10218] [ 2833.956297][T10218] memory: usage 864kB, limit 0kB, failcnt 13601 [ 2833.962705][T10218] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 23:16:49 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x84802, 0x0) [ 2833.969743][T10218] Memory cgroup stats for /syz0: [ 2834.123639][T10218] anon 0 [ 2834.123639][T10218] file 118784 [ 2834.123639][T10218] kernel 114688 [ 2834.123639][T10218] kernel_stack 0 [ 2834.123639][T10218] pagetables 0 [ 2834.123639][T10218] percpu 0 [ 2834.123639][T10218] sock 651264 [ 2834.123639][T10218] vmalloc 0 [ 2834.123639][T10218] shmem 118784 [ 2834.123639][T10218] file_mapped 118784 [ 2834.123639][T10218] file_dirty 0 [ 2834.123639][T10218] file_writeback 0 [ 2834.123639][T10218] swapcached 0 [ 2834.123639][T10218] inactive_anon 57344 [ 2834.123639][T10218] active_anon 61440 [ 2834.123639][T10218] inactive_file 0 [ 2834.123639][T10218] active_file 0 [ 2834.123639][T10218] unevictable 0 [ 2834.123639][T10218] slab_reclaimable 5048 [ 2834.123639][T10218] slab_unreclaimable 107736 [ 2834.123639][T10218] slab 112784 [ 2834.123639][T10218] workingset_refault_anon 0 [ 2834.123639][T10218] workingset_refault_file 48 [ 2834.123639][T10218] workingset_activate_anon 0 [ 2834.123639][T10218] workingset_activate_file 0 [ 2834.218115][T10218] Out of memory and no killable processes... [ 2834.224298][T10221] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2834.234481][T10221] CPU: 0 PID: 10221 Comm: syz-executor.5 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2834.244982][T10221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2834.255033][T10221] Call Trace: [ 2834.258377][T10221] [ 2834.261318][T10221] dump_stack_lvl+0xd6/0x122 [ 2834.265974][T10221] dump_stack+0x11/0x12 [ 2834.270143][T10221] dump_header+0x98/0x410 [ 2834.274482][T10221] out_of_memory+0x65e/0x880 [ 2834.279105][T10221] memory_max_write+0x31b/0x420 [ 2834.283974][T10221] ? memory_max_show+0x70/0x70 [ 2834.288748][T10221] cgroup_file_write+0x167/0x300 [ 2834.293705][T10221] ? __check_object_size+0x235/0x380 [ 2834.299067][T10221] ? cgroup_seqfile_stop+0x70/0x70 [ 2834.304197][T10221] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2834.309597][T10221] vfs_write+0x71c/0x890 [ 2834.313937][T10221] ksys_write+0xe8/0x1a0 [ 2834.318179][T10221] __x64_sys_write+0x3e/0x50 [ 2834.322807][T10221] do_syscall_64+0x2b/0x70 [ 2834.327288][T10221] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2834.333254][T10221] RIP: 0033:0x7f979ec120e9 [ 2834.337689][T10221] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2834.357361][T10221] RSP: 002b:00007f979e388168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2834.365775][T10221] RAX: ffffffffffffffda RBX: 00007f979ed24f60 RCX: 00007f979ec120e9 [ 2834.373792][T10221] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2834.381763][T10221] RBP: 00007f979ec6c08d R08: 0000000000000000 R09: 0000000000000000 [ 2834.389798][T10221] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2834.397768][T10221] R13: 00007ffe624163cf R14: 00007f979e388300 R15: 0000000000022000 [ 2834.405764][T10221] [ 2834.408830][T10221] memory: usage 864kB, limit 0kB, failcnt 13601 [ 2834.415087][T10221] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2834.421930][T10221] Memory cgroup stats for /syz0: [ 2834.454897][T10221] anon 0 [ 2834.454897][T10221] file 118784 [ 2834.454897][T10221] kernel 114688 [ 2834.454897][T10221] kernel_stack 0 [ 2834.454897][T10221] pagetables 0 [ 2834.454897][T10221] percpu 0 [ 2834.454897][T10221] sock 651264 [ 2834.454897][T10221] vmalloc 0 [ 2834.454897][T10221] shmem 118784 [ 2834.454897][T10221] file_mapped 118784 [ 2834.454897][T10221] file_dirty 0 [ 2834.454897][T10221] file_writeback 0 [ 2834.454897][T10221] swapcached 0 23:16:50 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0x0, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:16:50 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007ffb) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r3, r1, 0x0, 0x800100022007) 23:16:50 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000015c0)=""/188, 0xbc}], 0x1, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2834.454897][T10221] inactive_anon 57344 [ 2834.454897][T10221] active_anon 61440 [ 2834.454897][T10221] inactive_file 0 [ 2834.454897][T10221] active_file 0 [ 2834.454897][T10221] unevictable 0 [ 2834.454897][T10221] slab_reclaimable 5048 [ 2834.454897][T10221] slab_unreclaimable 107736 [ 2834.454897][T10221] slab 112784 [ 2834.454897][T10221] workingset_refault_anon 0 [ 2834.454897][T10221] workingset_refault_file 48 [ 2834.454897][T10221] workingset_activate_anon 0 [ 2834.454897][T10221] workingset_activate_file 0 [ 2834.549066][T10221] Out of memory and no killable processes... 23:16:50 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 23:16:50 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x32, &(0x7f0000000000)={@local, @local, @void, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @local}, {{0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, "48fd88", 0x0, "deba45"}}}}}}, 0x0) [ 2834.616679][T20545] device hsr_slave_0 left promiscuous mode [ 2834.623037][T20545] device hsr_slave_1 left promiscuous mode [ 2834.630686][T20545] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2834.638183][T20545] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2834.646148][T20545] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2834.653650][T20545] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2834.661438][T20545] device bridge_slave_1 left promiscuous mode [ 2834.667642][T20545] bridge0: port 2(bridge_slave_1) entered disabled state [ 2834.676384][T20545] device bridge_slave_0 left promiscuous mode [ 2834.682834][T20545] bridge0: port 1(bridge_slave_0) entered disabled state [ 2834.693185][T20545] device veth1_macvtap left promiscuous mode [ 2834.699273][T20545] device veth0_macvtap left promiscuous mode [ 2834.705332][T20545] device veth1_vlan left promiscuous mode [ 2834.711061][T20545] device veth0_vlan left promiscuous mode 23:16:50 executing program 2: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040), 0x4) [ 2834.823163][T20545] team0 (unregistering): Port device team_slave_1 removed [ 2834.837504][T20545] team0 (unregistering): Port device team_slave_0 removed [ 2834.856845][T20545] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2834.870356][T20545] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2834.879940][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2834.891411][T10243] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2834.902067][T10243] CPU: 1 PID: 10243 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2834.912594][T10243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2834.922646][T10243] Call Trace: [ 2834.925994][T10243] [ 2834.928915][T10243] dump_stack_lvl+0xd6/0x122 [ 2834.933516][T10243] dump_stack+0x11/0x12 [ 2834.937719][T10243] dump_header+0x98/0x410 [ 2834.942058][T10243] out_of_memory+0x65e/0x880 [ 2834.946654][T10243] memory_max_write+0x31b/0x420 [ 2834.951570][T10243] ? memory_max_show+0x70/0x70 [ 2834.956372][T10243] cgroup_file_write+0x167/0x300 [ 2834.961313][T10243] ? __check_object_size+0x235/0x380 [ 2834.966601][T10243] ? cgroup_seqfile_stop+0x70/0x70 [ 2834.971803][T10243] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2834.977094][T10243] vfs_write+0x71c/0x890 [ 2834.981339][T10243] ksys_write+0xe8/0x1a0 [ 2834.985582][T10243] __x64_sys_write+0x3e/0x50 [ 2834.990169][T10243] do_syscall_64+0x2b/0x70 [ 2834.994586][T10243] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2835.000481][T10243] RIP: 0033:0x7fce18d590e9 [ 2835.005006][T10243] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2835.024631][T10243] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2835.033069][T10243] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2835.041165][T10243] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2835.049173][T10243] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2835.057137][T10243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2835.065107][T10243] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2835.073148][T10243] [ 2835.076289][T10243] memory: usage 864kB, limit 0kB, failcnt 13601 [ 2835.082669][T10243] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2835.089673][T10243] Memory cgroup stats for /syz0: [ 2835.096549][T10243] anon 0 [ 2835.096549][T10243] file 118784 [ 2835.096549][T10243] kernel 114688 [ 2835.096549][T10243] kernel_stack 0 [ 2835.096549][T10243] pagetables 0 [ 2835.096549][T10243] percpu 0 [ 2835.096549][T10243] sock 651264 [ 2835.096549][T10243] vmalloc 0 [ 2835.096549][T10243] shmem 118784 [ 2835.096549][T10243] file_mapped 118784 [ 2835.096549][T10243] file_dirty 0 [ 2835.096549][T10243] file_writeback 0 [ 2835.096549][T10243] swapcached 0 [ 2835.096549][T10243] inactive_anon 57344 [ 2835.096549][T10243] active_anon 61440 [ 2835.096549][T10243] inactive_file 0 [ 2835.096549][T10243] active_file 0 [ 2835.096549][T10243] unevictable 0 [ 2835.096549][T10243] slab_reclaimable 5048 [ 2835.096549][T10243] slab_unreclaimable 107736 [ 2835.096549][T10243] slab 112784 [ 2835.096549][T10243] workingset_refault_anon 0 [ 2835.096549][T10243] workingset_refault_file 48 [ 2835.096549][T10243] workingset_activate_anon 0 [ 2835.096549][T10243] workingset_activate_file 0 [ 2835.190648][T10243] Out of memory and no killable processes... [ 2835.201237][T10239] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2835.211571][T10239] CPU: 0 PID: 10239 Comm: syz-executor.5 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2835.222170][T10239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2835.232277][T10239] Call Trace: [ 2835.235597][T10239] [ 2835.238533][T10239] dump_stack_lvl+0xd6/0x122 [ 2835.243209][T10239] dump_stack+0x11/0x12 [ 2835.247487][T10239] dump_header+0x98/0x410 [ 2835.251827][T10239] out_of_memory+0x65e/0x880 [ 2835.256417][T10239] memory_max_write+0x31b/0x420 [ 2835.261273][T10239] ? memory_max_show+0x70/0x70 [ 2835.266076][T10239] cgroup_file_write+0x167/0x300 [ 2835.271021][T10239] ? __check_object_size+0x235/0x380 [ 2835.276341][T10239] ? cgroup_seqfile_stop+0x70/0x70 [ 2835.281505][T10239] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2835.286874][T10239] vfs_write+0x71c/0x890 [ 2835.291187][T10239] ksys_write+0xe8/0x1a0 [ 2835.295509][T10239] __x64_sys_write+0x3e/0x50 [ 2835.300178][T10239] do_syscall_64+0x2b/0x70 [ 2835.304598][T10239] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2835.310529][T10239] RIP: 0033:0x7f979ec120e9 [ 2835.314938][T10239] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2835.334537][T10239] RSP: 002b:00007f979e388168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2835.342964][T10239] RAX: ffffffffffffffda RBX: 00007f979ed24f60 RCX: 00007f979ec120e9 [ 2835.350928][T10239] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2835.358889][T10239] RBP: 00007f979ec6c08d R08: 0000000000000000 R09: 0000000000000000 [ 2835.366853][T10239] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2835.374889][T10239] R13: 00007ffe624163cf R14: 00007f979e388300 R15: 0000000000022000 [ 2835.382852][T10239] [ 2835.386214][T10239] memory: usage 864kB, limit 0kB, failcnt 13601 [ 2835.392655][T10239] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2835.399828][T10239] Memory cgroup stats for /syz0: [ 2835.402533][T10239] anon 0 [ 2835.402533][T10239] file 118784 [ 2835.402533][T10239] kernel 114688 [ 2835.402533][T10239] kernel_stack 0 [ 2835.402533][T10239] pagetables 0 [ 2835.402533][T10239] percpu 0 [ 2835.402533][T10239] sock 651264 [ 2835.402533][T10239] vmalloc 0 [ 2835.402533][T10239] shmem 118784 [ 2835.402533][T10239] file_mapped 118784 [ 2835.402533][T10239] file_dirty 0 [ 2835.402533][T10239] file_writeback 0 [ 2835.402533][T10239] swapcached 0 [ 2835.402533][T10239] inactive_anon 57344 [ 2835.402533][T10239] active_anon 61440 [ 2835.402533][T10239] inactive_file 0 [ 2835.402533][T10239] active_file 0 [ 2835.402533][T10239] unevictable 0 [ 2835.402533][T10239] slab_reclaimable 5048 [ 2835.402533][T10239] slab_unreclaimable 107736 [ 2835.402533][T10239] slab 112784 [ 2835.402533][T10239] workingset_refault_anon 0 [ 2835.402533][T10239] workingset_refault_file 48 [ 2835.402533][T10239] workingset_activate_anon 0 [ 2835.402533][T10239] workingset_activate_file 0 [ 2835.496728][T10239] Out of memory and no killable processes... [ 2835.539143][T20545] bond0 (unregistering): Released all slaves [ 2835.805766][T10247] chnl_net:caif_netlink_parms(): no params data found [ 2835.823709][ T24] audit: type=1400 audit(1652311011.660:630): avc: denied { create } for pid=10256 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 2835.844428][ T24] audit: type=1400 audit(1652311011.660:631): avc: denied { setopt } for pid=10256 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 2835.876763][T10247] bridge0: port 1(bridge_slave_0) entered blocking state [ 2835.883895][T10247] bridge0: port 1(bridge_slave_0) entered disabled state [ 2835.891716][T10247] device bridge_slave_0 entered promiscuous mode [ 2835.899312][T10247] bridge0: port 2(bridge_slave_1) entered blocking state [ 2835.906446][T10247] bridge0: port 2(bridge_slave_1) entered disabled state [ 2835.914477][T10247] device bridge_slave_1 entered promiscuous mode [ 2835.938894][T10247] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2835.949394][T10247] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2835.969336][T10247] team0: Port device team_slave_0 added [ 2835.976107][T10247] team0: Port device team_slave_1 added [ 2835.991479][T10247] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2835.998446][T10247] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2836.024321][T10247] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2836.035760][T10247] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2836.042721][T10247] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2836.068625][T10247] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2836.093469][T10247] device hsr_slave_0 entered promiscuous mode [ 2836.101408][T10247] device hsr_slave_1 entered promiscuous mode [ 2836.107956][T10247] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2836.115550][T10247] Cannot create hsr debugfs directory [ 2836.143319][T10247] bridge0: port 2(bridge_slave_1) entered blocking state [ 2836.150373][T10247] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2836.157629][T10247] bridge0: port 1(bridge_slave_0) entered blocking state [ 2836.164655][T10247] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2836.192134][T10247] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2836.202116][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2836.210976][T10079] bridge0: port 1(bridge_slave_0) entered disabled state [ 2836.218881][T10079] bridge0: port 2(bridge_slave_1) entered disabled state [ 2836.230302][T10247] 8021q: adding VLAN 0 to HW filter on device team0 [ 2836.239755][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2836.249316][ T7472] bridge0: port 1(bridge_slave_0) entered blocking state [ 2836.256520][ T7472] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2836.267392][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2836.275791][ T1910] bridge0: port 2(bridge_slave_1) entered blocking state [ 2836.282820][ T1910] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2836.301451][T10247] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2836.311937][T10247] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2836.327917][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2836.336558][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2836.344811][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2836.353700][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2836.361915][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2836.369762][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2836.380123][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2836.388561][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2836.398229][T10247] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2836.474674][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2836.516819][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2836.525394][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2836.533129][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2836.542151][T10247] device veth0_vlan entered promiscuous mode [ 2836.550789][T10247] device veth1_vlan entered promiscuous mode [ 2836.563420][T10247] device veth0_macvtap entered promiscuous mode [ 2836.570792][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2836.578890][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2836.587250][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2836.595807][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2836.605313][T10247] device veth1_macvtap entered promiscuous mode [ 2836.616218][T10247] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2836.626668][T10247] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2836.636527][T10247] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2836.646936][T10247] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2836.657373][T10247] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2836.667810][T10247] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2836.677730][T10247] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2836.688155][T10247] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2836.697973][T10247] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2836.708433][T10247] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2836.718254][T10247] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2836.728676][T10247] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2836.740698][T10247] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2836.748897][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2836.759072][T10247] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2836.769489][T10247] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2836.779441][T10247] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2836.789915][T10247] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2836.799738][T10247] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2836.810142][T10247] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2836.819957][T10247] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2836.830361][T10247] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2836.840225][T10247] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2836.850633][T10247] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 23:16:52 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="3800000054e45d"], 0x38}}, 0x0) 23:16:52 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, 0x0, 0x0) 23:16:52 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0x0, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2836.860462][T10247] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2836.870874][T10247] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2836.881928][T10247] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2836.889589][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2836.898206][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 23:16:52 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000015c0)=""/188, 0xbc}], 0x1, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:16:52 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007ffb) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r3, r1, 0x0, 0x800100022007) 23:16:52 executing program 2: socketpair(0xa, 0x0, 0xcd3, &(0x7f00000000c0)) 23:16:52 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f00000004c0), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000006c0)={0x3c, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_LEVEL={0x1c, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}, @NL802154_SECLEVEL_ATTR_FRAME={0x8}]}]}, 0x3c}}, 0x0) 23:16:52 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000000)={@local, @local, @void, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2c, 0x0, @dev, @local}, {{0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, "48fd88", 0x0, "deba45"}}}}}}, 0x0) [ 2836.998882][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2837.029714][T10247] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2837.039683][T10247] CPU: 1 PID: 10247 Comm: syz-executor.0 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2837.050185][T10247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2837.060238][T10247] Call Trace: [ 2837.063517][T10247] [ 2837.066443][T10247] dump_stack_lvl+0xd6/0x122 [ 2837.071118][T10247] dump_stack+0x11/0x12 [ 2837.075268][T10247] dump_header+0x98/0x410 [ 2837.079661][T10247] oom_kill_process+0xfe/0x550 [ 2837.084494][T10247] out_of_memory+0x620/0x880 [ 2837.089079][T10247] mem_cgroup_oom+0x475/0x4f0 [ 2837.093758][T10247] try_charge_memcg+0x746/0x960 [ 2837.098607][T10247] ? try_to_unlazy+0x3c9/0x540 [ 2837.103420][T10247] obj_cgroup_charge+0x171/0x2b0 [ 2837.108365][T10247] memcg_slab_pre_alloc_hook+0xf7/0x170 [ 2837.113907][T10247] ? __d_alloc+0x3d/0x380 [ 2837.118302][T10247] kmem_cache_alloc_lru+0x76/0x2b0 [ 2837.123408][T10247] ? __d_lookup+0x3a6/0x3d0 [ 2837.127907][T10247] __d_alloc+0x3d/0x380 [ 2837.132125][T10247] d_alloc+0x2a/0x100 [ 2837.136099][T10247] __lookup_hash+0x8f/0x180 [ 2837.140611][T10247] filename_create+0x147/0x2b0 [ 2837.145391][T10247] do_mkdirat+0x63/0x280 [ 2837.149645][T10247] __x64_sys_mkdirat+0x4c/0x60 [ 2837.154409][T10247] do_syscall_64+0x2b/0x70 [ 2837.158855][T10247] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2837.164798][T10247] RIP: 0033:0x7f5b0f3fc1f7 [ 2837.169207][T10247] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2837.188830][T10247] RSP: 002b:00007ffc2d661568 EFLAGS: 00000202 ORIG_RAX: 0000000000000102 [ 2837.197239][T10247] RAX: ffffffffffffffda RBX: 00007ffc2d6615f0 RCX: 00007f5b0f3fc1f7 [ 2837.205253][T10247] RDX: 00000000000001ff RSI: 00007ffc2d6615f0 RDI: 00000000ffffff9c [ 2837.213224][T10247] RBP: 00007ffc2d6615cc R08: 0000000000000000 R09: 0000000000000003 [ 2837.221227][T10247] R10: 00007ffc2d661307 R11: 0000000000000202 R12: 0000000000000032 [ 2837.229192][T10247] R13: 00000000002b49c2 R14: 0000000000000002 R15: 00007ffc2d661630 [ 2837.237163][T10247] [ 2837.240200][T10247] memory: usage 920kB, limit 0kB, failcnt 13628 [ 2837.246454][T10247] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2837.253321][T10247] Memory cgroup stats for /syz0: [ 2837.260743][T10247] anon 36864 [ 2837.260743][T10247] file 118784 [ 2837.260743][T10247] kernel 135168 [ 2837.260743][T10247] kernel_stack 0 [ 2837.260743][T10247] pagetables 8192 [ 2837.260743][T10247] percpu 0 [ 2837.260743][T10247] sock 651264 [ 2837.260743][T10247] vmalloc 0 [ 2837.260743][T10247] shmem 118784 [ 2837.260743][T10247] file_mapped 118784 [ 2837.260743][T10247] file_dirty 0 [ 2837.260743][T10247] file_writeback 0 [ 2837.260743][T10247] swapcached 0 [ 2837.260743][T10247] inactive_anon 94208 [ 2837.260743][T10247] active_anon 61440 [ 2837.260743][T10247] inactive_file 0 [ 2837.260743][T10247] active_file 0 [ 2837.260743][T10247] unevictable 0 [ 2837.260743][T10247] slab_reclaimable 6008 [ 2837.260743][T10247] slab_unreclaimable 111280 [ 2837.260743][T10247] slab 117288 [ 2837.260743][T10247] workingset_refault_anon 0 [ 2837.260743][T10247] workingset_refault_file 48 [ 2837.260743][T10247] workingset_activate_anon 0 [ 2837.260743][T10247] workingset_activate_file 0 [ 2837.354986][T10247] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=10247,uid=0 [ 2837.370299][T10247] Memory cgroup out of memory: Killed process 10247 (syz-executor.0) total-vm:42336kB, anon-rss:364kB, file-rss:8192kB, shmem-rss:0kB, UID:0 pgtables:72kB oom_score_adj:0 [ 2837.399819][T10290] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2837.410274][T10290] CPU: 0 PID: 10290 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2837.420879][T10290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2837.430933][T10290] Call Trace: [ 2837.434229][T10290] [ 2837.437185][T10290] dump_stack_lvl+0xd6/0x122 [ 2837.441832][T10290] dump_stack+0x11/0x12 [ 2837.445986][T10290] dump_header+0x98/0x410 [ 2837.450390][T10290] out_of_memory+0x65e/0x880 [ 2837.454999][T10290] memory_max_write+0x31b/0x420 [ 2837.459853][T10290] ? memory_max_show+0x70/0x70 [ 2837.464623][T10290] cgroup_file_write+0x167/0x300 [ 2837.469642][T10290] ? __check_object_size+0x235/0x380 [ 2837.474937][T10290] ? cgroup_seqfile_stop+0x70/0x70 [ 2837.480119][T10290] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2837.485406][T10290] vfs_write+0x71c/0x890 [ 2837.489653][T10290] ksys_write+0xe8/0x1a0 [ 2837.493903][T10290] __x64_sys_write+0x3e/0x50 [ 2837.498526][T10290] do_syscall_64+0x2b/0x70 [ 2837.502976][T10290] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2837.508945][T10290] RIP: 0033:0x7fce18d590e9 [ 2837.513356][T10290] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2837.532975][T10290] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2837.541394][T10290] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2837.549371][T10290] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2837.557364][T10290] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2837.565347][T10290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2837.573312][T10290] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2837.581370][T10290] [ 2837.585339][T10290] memory: usage 872kB, limit 0kB, failcnt 13645 [ 2837.591710][T10290] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2837.598678][T10290] Memory cgroup stats for /syz0: [ 2837.606469][T10290] anon 0 [ 2837.606469][T10290] file 118784 [ 2837.606469][T10290] kernel 122880 [ 2837.606469][T10290] kernel_stack 0 [ 2837.606469][T10290] pagetables 0 [ 2837.606469][T10290] percpu 0 [ 2837.606469][T10290] sock 651264 [ 2837.606469][T10290] vmalloc 0 [ 2837.606469][T10290] shmem 118784 [ 2837.606469][T10290] file_mapped 118784 [ 2837.606469][T10290] file_dirty 0 [ 2837.606469][T10290] file_writeback 0 [ 2837.606469][T10290] swapcached 0 [ 2837.606469][T10290] inactive_anon 57344 [ 2837.606469][T10290] active_anon 61440 [ 2837.606469][T10290] inactive_file 0 [ 2837.606469][T10290] active_file 0 [ 2837.606469][T10290] unevictable 0 [ 2837.606469][T10290] slab_reclaimable 4632 [ 2837.606469][T10290] slab_unreclaimable 111016 [ 2837.606469][T10290] slab 115648 [ 2837.606469][T10290] workingset_refault_anon 0 [ 2837.606469][T10290] workingset_refault_file 48 [ 2837.606469][T10290] workingset_activate_anon 0 [ 2837.606469][T10290] workingset_activate_file 0 [ 2837.700096][T10290] Out of memory and no killable processes... [ 2837.706532][T10292] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2837.716871][T10292] CPU: 0 PID: 10292 Comm: syz-executor.5 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2837.727378][T10292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2837.737461][T10292] Call Trace: [ 2837.740740][T10292] [ 2837.743663][T10292] dump_stack_lvl+0xd6/0x122 [ 2837.748296][T10292] dump_stack+0x11/0x12 [ 2837.752451][T10292] dump_header+0x98/0x410 [ 2837.756904][T10292] out_of_memory+0x65e/0x880 [ 2837.761496][T10292] memory_max_write+0x31b/0x420 [ 2837.766350][T10292] ? memory_max_show+0x70/0x70 [ 2837.771113][T10292] cgroup_file_write+0x167/0x300 [ 2837.776092][T10292] ? cgroup_seqfile_stop+0x70/0x70 [ 2837.781241][T10292] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2837.786545][T10292] vfs_write+0x71c/0x890 [ 2837.790802][T10292] ksys_write+0xe8/0x1a0 [ 2837.795125][T10292] __x64_sys_write+0x3e/0x50 [ 2837.799735][T10292] do_syscall_64+0x2b/0x70 [ 2837.804153][T10292] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2837.810132][T10292] RIP: 0033:0x7f979ec120e9 [ 2837.814572][T10292] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2837.834176][T10292] RSP: 002b:00007f979e388168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2837.842606][T10292] RAX: ffffffffffffffda RBX: 00007f979ed24f60 RCX: 00007f979ec120e9 23:16:53 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x0) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2837.850560][T10292] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2837.858510][T10292] RBP: 00007f979ec6c08d R08: 0000000000000000 R09: 0000000000000000 [ 2837.866523][T10292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2837.874477][T10292] R13: 00007ffe624163cf R14: 00007f979e388300 R15: 0000000000022000 [ 2837.882451][T10292] [ 2837.885528][T10292] memory: usage 868kB, limit 0kB, failcnt 13645 [ 2837.891764][T10292] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 23:16:53 executing program 4: sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(0xffffffffffffffff, 0x0, 0xe33ebb40c54f3d2f) [ 2837.898643][T10292] Memory cgroup stats for /syz0: [ 2837.903465][T10292] anon 0 [ 2837.903465][T10292] file 118784 [ 2837.903465][T10292] kernel 118784 [ 2837.903465][T10292] kernel_stack 0 [ 2837.903465][T10292] pagetables 0 [ 2837.903465][T10292] percpu 0 [ 2837.903465][T10292] sock 651264 [ 2837.903465][T10292] vmalloc 0 [ 2837.903465][T10292] shmem 118784 [ 2837.903465][T10292] file_mapped 118784 [ 2837.903465][T10292] file_dirty 0 [ 2837.903465][T10292] file_writeback 0 [ 2837.903465][T10292] swapcached 0 [ 2837.903465][T10292] inactive_anon 57344 [ 2837.903465][T10292] active_anon 61440 23:16:53 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, 0xfffffffffffffffe) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) keyctl$unlink(0x9, 0x0, r0) 23:16:53 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000015c0)=""/188, 0xbc}], 0x1, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:16:53 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000b00), r0) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b40)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x28}}, 0x0) 23:16:53 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000940)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='codepage=936,time_offset=0xfff']) [ 2837.903465][T10292] inactive_file 0 [ 2837.903465][T10292] active_file 0 [ 2837.903465][T10292] unevictable 0 [ 2837.903465][T10292] slab_reclaimable 3256 [ 2837.903465][T10292] slab_unreclaimable 111016 [ 2837.903465][T10292] slab 114272 [ 2837.903465][T10292] workingset_refault_anon 0 [ 2837.903465][T10292] workingset_refault_file 48 [ 2837.903465][T10292] workingset_activate_anon 0 [ 2837.903465][T10292] workingset_activate_file 0 [ 2837.996978][T10292] Out of memory and no killable processes... 23:16:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) 23:16:54 executing program 1: syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) setns(0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f00000005c0)) 23:16:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000033c0)) [ 2838.164929][T10304] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2838.175575][T10304] CPU: 0 PID: 10304 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2838.186080][T10304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2838.196135][T10304] Call Trace: [ 2838.199411][T10304] [ 2838.202401][T10304] dump_stack_lvl+0xd6/0x122 [ 2838.207010][T10304] dump_stack+0x11/0x12 [ 2838.211169][T10304] dump_header+0x98/0x410 [ 2838.215505][T10304] out_of_memory+0x65e/0x880 [ 2838.220097][T10304] memory_max_write+0x31b/0x420 [ 2838.224959][T10304] ? memory_max_show+0x70/0x70 [ 2838.229742][T10304] cgroup_file_write+0x167/0x300 [ 2838.234697][T10304] ? __check_object_size+0x235/0x380 [ 2838.239992][T10304] ? cgroup_seqfile_stop+0x70/0x70 [ 2838.245125][T10304] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2838.250454][T10304] vfs_write+0x71c/0x890 [ 2838.254778][T10304] ksys_write+0xe8/0x1a0 [ 2838.259104][T10304] __x64_sys_write+0x3e/0x50 [ 2838.263709][T10304] do_syscall_64+0x2b/0x70 [ 2838.268234][T10304] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2838.274270][T10304] RIP: 0033:0x7fce18d590e9 [ 2838.278741][T10304] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2838.298355][T10304] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2838.306831][T10304] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 23:16:54 executing program 2: r0 = memfd_create(&(0x7f0000000180)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x0) sendfile(r0, r1, &(0x7f0000000100), 0x220) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7d, &(0x7f0000000440)={0x0, @in={{0x2, 0x0, @broadcast}}}, &(0x7f00000000c0)=0x84) 23:16:54 executing program 1: clock_adjtime(0x0, &(0x7f00000003c0)={0x3}) [ 2838.314844][T10304] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2838.322879][T10304] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2838.330856][T10304] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2838.338827][T10304] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2838.346806][T10304] [ 2838.349901][T10304] memory: usage 864kB, limit 0kB, failcnt 13645 [ 2838.356250][T10304] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2838.363240][T10304] Memory cgroup stats for /syz0: [ 2838.398636][T10304] anon 0 [ 2838.398636][T10304] file 118784 [ 2838.398636][T10304] kernel 114688 [ 2838.398636][T10304] kernel_stack 0 [ 2838.398636][T10304] pagetables 0 [ 2838.398636][T10304] percpu 0 [ 2838.398636][T10304] sock 651264 [ 2838.398636][T10304] vmalloc 0 [ 2838.398636][T10304] shmem 118784 [ 2838.398636][T10304] file_mapped 118784 [ 2838.398636][T10304] file_dirty 0 [ 2838.398636][T10304] file_writeback 0 [ 2838.398636][T10304] swapcached 0 [ 2838.398636][T10304] inactive_anon 57344 [ 2838.398636][T10304] active_anon 61440 [ 2838.398636][T10304] inactive_file 0 [ 2838.398636][T10304] active_file 0 [ 2838.398636][T10304] unevictable 0 [ 2838.398636][T10304] slab_reclaimable 3256 [ 2838.398636][T10304] slab_unreclaimable 107736 [ 2838.398636][T10304] slab 110992 [ 2838.398636][T10304] workingset_refault_anon 0 [ 2838.398636][T10304] workingset_refault_file 48 [ 2838.398636][T10304] workingset_activate_anon 0 [ 2838.398636][T10304] workingset_activate_file 0 [ 2838.492615][T10304] Out of memory and no killable processes... [ 2838.572371][T10315] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2838.582597][T10315] CPU: 1 PID: 10315 Comm: syz-executor.5 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2838.593207][T10315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2838.603324][T10315] Call Trace: [ 2838.606602][T10315] [ 2838.609555][T10315] dump_stack_lvl+0xd6/0x122 [ 2838.614236][T10315] dump_stack+0x11/0x12 [ 2838.618400][T10315] dump_header+0x98/0x410 [ 2838.622733][T10315] out_of_memory+0x65e/0x880 [ 2838.627345][T10315] memory_max_write+0x31b/0x420 [ 2838.632239][T10315] ? memory_max_show+0x70/0x70 [ 2838.637057][T10315] cgroup_file_write+0x167/0x300 [ 2838.642005][T10315] ? __check_object_size+0x235/0x380 [ 2838.647333][T10315] ? cgroup_seqfile_stop+0x70/0x70 [ 2838.652460][T10315] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2838.657761][T10315] vfs_write+0x71c/0x890 [ 2838.662076][T10315] ksys_write+0xe8/0x1a0 [ 2838.666391][T10315] __x64_sys_write+0x3e/0x50 23:16:54 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x0) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2838.670995][T10315] do_syscall_64+0x2b/0x70 [ 2838.675467][T10315] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2838.681368][T10315] RIP: 0033:0x7f979ec120e9 [ 2838.685824][T10315] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2838.705490][T10315] RSP: 002b:00007f979e388168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2838.713893][T10315] RAX: ffffffffffffffda RBX: 00007f979ed24f60 RCX: 00007f979ec120e9 [ 2838.721934][T10315] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2838.729900][T10315] RBP: 00007f979ec6c08d R08: 0000000000000000 R09: 0000000000000000 [ 2838.737851][T10315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2838.745803][T10315] R13: 00007ffe624163cf R14: 00007f979e388300 R15: 0000000000022000 [ 2838.753756][T10315] [ 2838.756873][T10315] memory: usage 864kB, limit 0kB, failcnt 13645 [ 2838.763099][T10315] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 23:16:54 executing program 4: syz_genetlink_get_family_id$batadv(&(0x7f0000000100), 0xffffffffffffffff) stat(0x0, 0x0) [ 2838.769947][T10315] Memory cgroup stats for /syz0: [ 2838.771081][T10315] anon 0 [ 2838.771081][T10315] file 118784 [ 2838.771081][T10315] kernel 114688 [ 2838.771081][T10315] kernel_stack 0 [ 2838.771081][T10315] pagetables 0 [ 2838.771081][T10315] percpu 0 [ 2838.771081][T10315] sock 651264 [ 2838.771081][T10315] vmalloc 0 [ 2838.771081][T10315] shmem 118784 [ 2838.771081][T10315] file_mapped 118784 [ 2838.771081][T10315] file_dirty 0 [ 2838.771081][T10315] file_writeback 0 [ 2838.771081][T10315] swapcached 0 [ 2838.771081][T10315] inactive_anon 57344 23:16:54 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000015c0)=""/188, 0xbc}], 0x1, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2838.771081][T10315] active_anon 61440 [ 2838.771081][T10315] inactive_file 0 [ 2838.771081][T10315] active_file 0 [ 2838.771081][T10315] unevictable 0 [ 2838.771081][T10315] slab_reclaimable 3256 [ 2838.771081][T10315] slab_unreclaimable 107736 [ 2838.771081][T10315] slab 110992 [ 2838.771081][T10315] workingset_refault_anon 0 [ 2838.771081][T10315] workingset_refault_file 48 [ 2838.771081][T10315] workingset_activate_anon 0 [ 2838.771081][T10315] workingset_activate_file 0 [ 2838.865279][T10315] Out of memory and no killable processes... 23:16:54 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) 23:16:54 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) socketpair(0x0, 0x0, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$gtp(&(0x7f00000009c0), 0xffffffffffffffff) 23:16:54 executing program 4: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$gtp(0x0, 0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b40)={0x14, 0x0, 0x1}, 0x14}}, 0x0) [ 2839.002938][T10326] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2839.013311][T10326] CPU: 1 PID: 10326 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2839.023900][T10326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2839.033949][T10326] Call Trace: [ 2839.037207][T10326] [ 2839.040118][T10326] dump_stack_lvl+0xd6/0x122 [ 2839.044736][T10326] dump_stack+0x11/0x12 [ 2839.048872][T10326] dump_header+0x98/0x410 [ 2839.053222][T10326] out_of_memory+0x65e/0x880 [ 2839.057893][T10326] memory_max_write+0x31b/0x420 [ 2839.062777][T10326] ? memory_max_show+0x70/0x70 [ 2839.067532][T10326] cgroup_file_write+0x167/0x300 [ 2839.072539][T10326] ? __check_object_size+0x235/0x380 [ 2839.077817][T10326] ? cgroup_seqfile_stop+0x70/0x70 [ 2839.082943][T10326] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2839.088217][T10326] vfs_write+0x71c/0x890 [ 2839.092564][T10326] ksys_write+0xe8/0x1a0 [ 2839.096789][T10326] __x64_sys_write+0x3e/0x50 [ 2839.101361][T10326] do_syscall_64+0x2b/0x70 [ 2839.105792][T10326] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2839.111694][T10326] RIP: 0033:0x7fce18d590e9 [ 2839.116153][T10326] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2839.135760][T10326] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2839.144233][T10326] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2839.152207][T10326] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2839.160235][T10326] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2839.168204][T10326] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2839.176204][T10326] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2839.184157][T10326] [ 2839.187218][T10326] memory: usage 864kB, limit 0kB, failcnt 13645 [ 2839.193542][T10326] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2839.200427][T10326] Memory cgroup stats for /syz0: [ 2839.201599][T10326] anon 0 [ 2839.201599][T10326] file 118784 [ 2839.201599][T10326] kernel 114688 [ 2839.201599][T10326] kernel_stack 0 [ 2839.201599][T10326] pagetables 0 [ 2839.201599][T10326] percpu 0 [ 2839.201599][T10326] sock 651264 [ 2839.201599][T10326] vmalloc 0 [ 2839.201599][T10326] shmem 118784 [ 2839.201599][T10326] file_mapped 118784 [ 2839.201599][T10326] file_dirty 0 [ 2839.201599][T10326] file_writeback 0 [ 2839.201599][T10326] swapcached 0 [ 2839.201599][T10326] inactive_anon 57344 [ 2839.201599][T10326] active_anon 61440 [ 2839.201599][T10326] inactive_file 0 [ 2839.201599][T10326] active_file 0 [ 2839.201599][T10326] unevictable 0 [ 2839.201599][T10326] slab_reclaimable 3256 [ 2839.201599][T10326] slab_unreclaimable 107736 [ 2839.201599][T10326] slab 110992 [ 2839.201599][T10326] workingset_refault_anon 0 [ 2839.201599][T10326] workingset_refault_file 48 [ 2839.201599][T10326] workingset_activate_anon 0 [ 2839.201599][T10326] workingset_activate_file 0 [ 2839.295391][T10326] Out of memory and no killable processes... 23:16:55 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x0) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2839.303895][T29609] device hsr_slave_0 left promiscuous mode [ 2839.313460][T29609] device hsr_slave_1 left promiscuous mode [ 2839.320122][T29609] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2839.326224][T10329] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2839.327638][T29609] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2839.337661][T10329] CPU: 1 PID: 10329 Comm: syz-executor.5 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2839.355209][T10329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2839.365267][T10329] Call Trace: [ 2839.368528][T10329] [ 2839.371437][T10329] dump_stack_lvl+0xd6/0x122 [ 2839.376058][T10329] dump_stack+0x11/0x12 [ 2839.380195][T10329] dump_header+0x98/0x410 [ 2839.384571][T10329] out_of_memory+0x65e/0x880 [ 2839.389146][T10329] memory_max_write+0x31b/0x420 [ 2839.394125][T10329] ? memory_max_show+0x70/0x70 [ 2839.398947][T10329] cgroup_file_write+0x167/0x300 [ 2839.403868][T10329] ? __check_object_size+0x235/0x380 [ 2839.409229][T10329] ? cgroup_seqfile_stop+0x70/0x70 [ 2839.414322][T10329] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2839.419606][T10329] vfs_write+0x71c/0x890 [ 2839.423883][T10329] ksys_write+0xe8/0x1a0 [ 2839.428105][T10329] __x64_sys_write+0x3e/0x50 [ 2839.432675][T10329] do_syscall_64+0x2b/0x70 [ 2839.437074][T10329] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2839.442999][T10329] RIP: 0033:0x7f979ec120e9 [ 2839.447470][T10329] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2839.467108][T10329] RSP: 002b:00007f979e388168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2839.475497][T10329] RAX: ffffffffffffffda RBX: 00007f979ed24f60 RCX: 00007f979ec120e9 [ 2839.483448][T10329] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2839.491435][T10329] RBP: 00007f979ec6c08d R08: 0000000000000000 R09: 0000000000000000 [ 2839.499401][T10329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2839.507369][T10329] R13: 00007ffe624163cf R14: 00007f979e388300 R15: 0000000000022000 [ 2839.515390][T10329] [ 2839.518642][T10329] memory: usage 864kB, limit 0kB, failcnt 13645 [ 2839.519632][T29609] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2839.524927][T10329] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2839.525035][T10329] Memory cgroup stats for /syz0: [ 2839.527091][T10329] anon 0 [ 2839.527091][T10329] file 118784 [ 2839.527091][T10329] kernel 114688 [ 2839.527091][T10329] kernel_stack 0 [ 2839.527091][T10329] pagetables 0 [ 2839.527091][T10329] percpu 0 [ 2839.527091][T10329] sock 651264 [ 2839.527091][T10329] vmalloc 0 [ 2839.527091][T10329] shmem 118784 [ 2839.527091][T10329] file_mapped 118784 [ 2839.527091][T10329] file_dirty 0 [ 2839.527091][T10329] file_writeback 0 [ 2839.527091][T10329] swapcached 0 [ 2839.527091][T10329] inactive_anon 57344 [ 2839.527091][T10329] active_anon 61440 [ 2839.527091][T10329] inactive_file 0 [ 2839.527091][T10329] active_file 0 [ 2839.527091][T10329] unevictable 0 [ 2839.527091][T10329] slab_reclaimable 3256 [ 2839.527091][T10329] slab_unreclaimable 107736 [ 2839.527091][T10329] slab 110992 [ 2839.527091][T10329] workingset_refault_anon 0 [ 2839.527091][T10329] workingset_refault_file 48 [ 2839.527091][T10329] workingset_activate_anon 0 [ 2839.527091][T10329] workingset_activate_file 0 [ 2839.532484][T29609] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2839.539278][T10329] Out of memory and no killable processes... [ 2839.646580][T29609] device bridge_slave_1 left promiscuous mode [ 2839.652754][T29609] bridge0: port 2(bridge_slave_1) entered disabled state [ 2839.662756][T29609] device bridge_slave_0 left promiscuous mode [ 2839.668968][T29609] bridge0: port 1(bridge_slave_0) entered disabled state [ 2839.679589][T29609] device veth1_macvtap left promiscuous mode [ 2839.685635][T29609] device veth0_macvtap left promiscuous mode [ 2839.691625][T29609] device veth1_vlan left promiscuous mode [ 2839.697547][T29609] device veth0_vlan left promiscuous mode [ 2839.849016][T29609] team0 (unregistering): Port device team_slave_1 removed [ 2839.859669][T29609] team0 (unregistering): Port device team_slave_0 removed [ 2839.870390][T29609] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2839.881698][T29609] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2839.915404][T29609] bond0 (unregistering): Released all slaves [ 2840.034658][T10340] chnl_net:caif_netlink_parms(): no params data found [ 2840.073507][T10352] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2840.083908][T10352] CPU: 1 PID: 10352 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2840.094386][T10352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2840.104416][T10352] Call Trace: [ 2840.107673][T10352] [ 2840.110581][T10352] dump_stack_lvl+0xd6/0x122 [ 2840.115157][T10352] dump_stack+0x11/0x12 [ 2840.119299][T10352] dump_header+0x98/0x410 [ 2840.123630][T10352] out_of_memory+0x65e/0x880 [ 2840.128336][T10352] memory_max_write+0x31b/0x420 [ 2840.133225][T10352] ? memory_max_show+0x70/0x70 [ 2840.137993][T10352] cgroup_file_write+0x167/0x300 [ 2840.142983][T10352] ? __check_object_size+0x235/0x380 [ 2840.148248][T10352] ? cgroup_seqfile_stop+0x70/0x70 [ 2840.153346][T10352] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2840.158781][T10352] vfs_write+0x71c/0x890 [ 2840.163024][T10352] ksys_write+0xe8/0x1a0 [ 2840.167306][T10352] __x64_sys_write+0x3e/0x50 [ 2840.171968][T10352] do_syscall_64+0x2b/0x70 [ 2840.176428][T10352] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2840.182329][T10352] RIP: 0033:0x7fce18d590e9 [ 2840.186761][T10352] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2840.206359][T10352] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2840.214832][T10352] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2840.222787][T10352] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2840.230761][T10352] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2840.238730][T10352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2840.246679][T10352] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2840.254736][T10352] [ 2840.257808][T10352] memory: usage 864kB, limit 0kB, failcnt 13645 [ 2840.264137][T10352] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2840.271048][T10352] Memory cgroup stats for /syz0: [ 2840.271614][T10340] bridge0: port 1(bridge_slave_0) entered blocking state [ 2840.273931][T10352] anon 0 [ 2840.273931][T10352] file 118784 [ 2840.273931][T10352] kernel 114688 [ 2840.273931][T10352] kernel_stack 0 [ 2840.273931][T10352] pagetables 0 [ 2840.273931][T10352] percpu 0 [ 2840.273931][T10352] sock 651264 [ 2840.273931][T10352] vmalloc 0 [ 2840.273931][T10352] shmem 118784 [ 2840.273931][T10352] file_mapped 118784 [ 2840.273931][T10352] file_dirty 0 [ 2840.273931][T10352] file_writeback 0 [ 2840.273931][T10352] swapcached 0 [ 2840.273931][T10352] inactive_anon 57344 [ 2840.273931][T10352] active_anon 61440 [ 2840.273931][T10352] inactive_file 0 [ 2840.273931][T10352] active_file 0 [ 2840.273931][T10352] unevictable 0 [ 2840.273931][T10352] slab_reclaimable 3256 [ 2840.273931][T10352] slab_unreclaimable 107736 [ 2840.273931][T10352] slab 110992 [ 2840.273931][T10352] workingset_refault_anon 0 [ 2840.273931][T10352] workingset_refault_file 48 [ 2840.273931][T10352] workingset_activate_anon 0 [ 2840.273931][T10352] workingset_activate_file 0 [ 2840.276650][T10340] bridge0: port 1(bridge_slave_0) entered disabled state [ 2840.279016][T10340] device bridge_slave_0 entered promiscuous mode [ 2840.283753][T10352] Out of memory and no killable processes... [ 2840.393052][T10340] bridge0: port 2(bridge_slave_1) entered blocking state [ 2840.400128][T10340] bridge0: port 2(bridge_slave_1) entered disabled state [ 2840.407949][T10340] device bridge_slave_1 entered promiscuous mode [ 2840.424008][T10340] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2840.435453][T10340] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2840.453247][T10340] team0: Port device team_slave_0 added [ 2840.459932][T10340] team0: Port device team_slave_1 added [ 2840.475363][T10340] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2840.482302][T10340] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2840.508213][T10340] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2840.519582][T10340] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2840.526639][T10340] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2840.552555][T10340] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2840.582135][T10340] device hsr_slave_0 entered promiscuous mode [ 2840.588971][T10340] device hsr_slave_1 entered promiscuous mode [ 2840.595654][T10340] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2840.603187][T10340] Cannot create hsr debugfs directory [ 2840.630303][T10340] bridge0: port 2(bridge_slave_1) entered blocking state [ 2840.637428][T10340] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2840.644677][T10340] bridge0: port 1(bridge_slave_0) entered blocking state [ 2840.651761][T10340] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2840.676920][T10340] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2840.688291][T10340] 8021q: adding VLAN 0 to HW filter on device team0 [ 2840.696785][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2840.705116][ T7472] bridge0: port 1(bridge_slave_0) entered disabled state [ 2840.713737][ T7472] bridge0: port 2(bridge_slave_1) entered disabled state [ 2840.726733][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2840.735027][ T9279] bridge0: port 1(bridge_slave_0) entered blocking state [ 2840.742064][ T9279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2840.760744][T10340] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2840.771123][T10340] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2840.784191][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2840.792553][ T9279] bridge0: port 2(bridge_slave_1) entered blocking state [ 2840.799593][ T9279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2840.808551][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2840.817268][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2840.825889][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2840.834007][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2840.842294][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2840.849978][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2840.864581][T10340] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2840.871837][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2840.879625][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2840.948605][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2840.988868][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2840.997216][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2841.007113][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2841.014879][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2841.023667][T10340] device veth0_vlan entered promiscuous mode [ 2841.032472][T10340] device veth1_vlan entered promiscuous mode [ 2841.044596][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2841.053648][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2841.061898][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2841.071447][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2841.081720][T10340] device veth0_macvtap entered promiscuous mode [ 2841.089858][T10340] device veth1_macvtap entered promiscuous mode [ 2841.100109][T10340] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2841.110547][T10340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2841.120375][T10340] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2841.130802][T10340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2841.140695][T10340] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2841.151108][T10340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2841.161033][T10340] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2841.171434][T10340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2841.181238][T10340] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2841.191648][T10340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2841.201474][T10340] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2841.211916][T10340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2841.222996][T10340] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2841.232180][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2841.240357][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2841.248290][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2841.256827][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2841.267332][T10340] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2841.277770][T10340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2841.287649][T10340] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2841.298082][T10340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2841.307909][T10340] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2841.318321][T10340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2841.328211][T10340] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2841.338645][T10340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2841.348440][T10340] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2841.358897][T10340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2841.368723][T10340] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2841.379206][T10340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2841.390460][T10340] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2841.399685][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2841.408392][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 23:16:57 executing program 0: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000200)='ns/ipc\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, 0x0) 23:16:57 executing program 1: sendto$isdn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x6) socketpair(0x0, 0x0, 0x0, &(0x7f00000005c0)) 23:16:57 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000015c0)=""/188, 0xbc}], 0x1, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:16:57 executing program 2: sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, 0x0, 0x0) sendto$isdn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x6) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) setns(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000005c0)) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x0, 0x0, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$gtp(&(0x7f00000009c0), 0xffffffffffffffff) 23:16:57 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0x2, 0x4e22, 0x0, @empty}, r1}}, 0x30) 23:16:57 executing program 3: socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r0, 0xa, 0xffffffffffffffff, 0x2) close(0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x12) 23:16:57 executing program 4: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 23:16:57 executing program 1: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f00000009c0), r0) 23:16:57 executing program 2: syz_genetlink_get_family_id$gtp(&(0x7f00000009c0), 0xffffffffffffffff) [ 2841.512903][T10340] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2841.523112][T10340] CPU: 0 PID: 10340 Comm: syz-executor.0 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2841.533639][T10340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2841.543696][T10340] Call Trace: [ 2841.546974][T10340] [ 2841.549902][T10340] dump_stack_lvl+0xd6/0x122 [ 2841.554504][T10340] dump_stack+0x11/0x12 [ 2841.558664][T10340] dump_header+0x98/0x410 [ 2841.563001][T10340] oom_kill_process+0xfe/0x550 [ 2841.567764][T10340] out_of_memory+0x620/0x880 [ 2841.572344][T10340] mem_cgroup_oom+0x475/0x4f0 [ 2841.577080][T10340] try_charge_memcg+0x746/0x960 [ 2841.581955][T10340] obj_cgroup_charge+0x171/0x2b0 [ 2841.586957][T10340] memcg_slab_pre_alloc_hook+0xf7/0x170 [ 2841.592504][T10340] ? __d_alloc+0x3d/0x380 [ 2841.596860][T10340] kmem_cache_alloc_lru+0x76/0x2b0 [ 2841.601956][T10340] __d_alloc+0x3d/0x380 [ 2841.606138][T10340] d_alloc_parallel+0x51/0xcc0 23:16:57 executing program 4: syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) socketpair(0x18, 0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEV(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x4000055) socketpair(0x0, 0x0, 0x0, &(0x7f00000005c0)) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x0, 0x3, &(0x7f0000000700)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$gtp(&(0x7f00000009c0), 0xffffffffffffffff) [ 2841.610894][T10340] ? selinux_inode_permission+0x2d8/0x400 [ 2841.616603][T10340] ? selinux_inode_permission+0x335/0x400 [ 2841.622334][T10340] ? lockref_get_not_dead+0xeb/0x190 [ 2841.627608][T10340] ? __rcu_read_unlock+0x4a/0x70 [ 2841.632564][T10340] ? __down_read_common+0x16c/0x4c0 [ 2841.637774][T10340] __lookup_slow+0x80/0x250 [ 2841.642280][T10340] lookup_slow+0x3c/0x60 [ 2841.646523][T10340] walk_component+0x23d/0x280 [ 2841.651197][T10340] path_lookupat+0x11d/0x2b0 [ 2841.655771][T10340] filename_lookup+0x130/0x310 23:16:57 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x0, 0x3, &(0x7f0000000700)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 23:16:57 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000001cc0)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) [ 2841.660525][T10340] user_path_at_empty+0x3e/0x110 [ 2841.665458][T10340] __x64_sys_umount+0x84/0xe0 [ 2841.670122][T10340] do_syscall_64+0x2b/0x70 [ 2841.674645][T10340] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2841.680540][T10340] RIP: 0033:0x7f0e09068557 [ 2841.684950][T10340] Code: ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2841.704592][T10340] RSP: 002b:00007ffd2a2e2448 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 2841.713009][T10340] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0e09068557 [ 2841.721044][T10340] RDX: 00007ffd2a2e251e RSI: 000000000000000a RDI: 00007ffd2a2e2510 [ 2841.729014][T10340] RBP: 00007ffd2a2e2510 R08: 00000000ffffffff R09: 00007ffd2a2e22e0 [ 2841.736987][T10340] R10: 0000555555b5f7c3 R11: 0000000000000246 R12: 00007f0e090c01f8 [ 2841.744959][T10340] R13: 00007ffd2a2e35d0 R14: 0000555555b5f6f0 R15: 00007ffd2a2e3610 [ 2841.752964][T10340] [ 2841.756002][T10340] memory: usage 920kB, limit 0kB, failcnt 13664 [ 2841.762232][T10340] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2841.769094][T10340] Memory cgroup stats for /syz0: [ 2841.773774][T10340] anon 36864 [ 2841.773774][T10340] file 118784 [ 2841.773774][T10340] kernel 135168 [ 2841.773774][T10340] kernel_stack 0 [ 2841.773774][T10340] pagetables 8192 [ 2841.773774][T10340] percpu 0 [ 2841.773774][T10340] sock 651264 [ 2841.773774][T10340] vmalloc 0 [ 2841.773774][T10340] shmem 118784 [ 2841.773774][T10340] file_mapped 118784 [ 2841.773774][T10340] file_dirty 0 [ 2841.773774][T10340] file_writeback 0 [ 2841.773774][T10340] swapcached 0 [ 2841.773774][T10340] inactive_anon 94208 [ 2841.773774][T10340] active_anon 61440 [ 2841.773774][T10340] inactive_file 0 [ 2841.773774][T10340] active_file 0 [ 2841.773774][T10340] unevictable 0 [ 2841.773774][T10340] slab_reclaimable 6984 [ 2841.773774][T10340] slab_unreclaimable 111520 [ 2841.773774][T10340] slab 118504 [ 2841.773774][T10340] workingset_refault_anon 0 [ 2841.773774][T10340] workingset_refault_file 48 [ 2841.773774][T10340] workingset_activate_anon 0 [ 2841.773774][T10340] workingset_activate_file 0 [ 2841.868063][T10340] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=10340,uid=0 [ 2841.883389][T10340] Memory cgroup out of memory: Killed process 10340 (syz-executor.0) total-vm:42336kB, anon-rss:364kB, file-rss:8192kB, shmem-rss:0kB, UID:0 pgtables:72kB oom_score_adj:0 [ 2841.918672][T10387] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2841.929045][T10387] CPU: 1 PID: 10387 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2841.939541][T10387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2841.949609][T10387] Call Trace: [ 2841.952883][T10387] [ 2841.955816][T10387] dump_stack_lvl+0xd6/0x122 [ 2841.960457][T10387] dump_stack+0x11/0x12 [ 2841.964591][T10387] dump_header+0x98/0x410 [ 2841.968899][T10387] out_of_memory+0x65e/0x880 [ 2841.973501][T10387] memory_max_write+0x31b/0x420 [ 2841.978386][T10387] ? memory_max_show+0x70/0x70 [ 2841.983131][T10387] cgroup_file_write+0x167/0x300 [ 2841.988140][T10387] ? cgroup_seqfile_stop+0x70/0x70 [ 2841.993248][T10387] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2841.998617][T10387] vfs_write+0x71c/0x890 [ 2842.002896][T10387] ksys_write+0xe8/0x1a0 [ 2842.007158][T10387] __x64_sys_write+0x3e/0x50 [ 2842.011728][T10387] do_syscall_64+0x2b/0x70 [ 2842.016156][T10387] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2842.022030][T10387] RIP: 0033:0x7fce18d590e9 [ 2842.026421][T10387] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2842.046074][T10387] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2842.054546][T10387] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2842.062493][T10387] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000e [ 2842.070443][T10387] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2842.078458][T10387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2842.086471][T10387] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2842.094434][T10387] [ 2842.097939][T10387] memory: usage 872kB, limit 0kB, failcnt 13681 [ 2842.104255][T10387] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2842.111153][T10387] Memory cgroup stats for /syz0: [ 2842.112228][T10387] anon 0 [ 2842.112228][T10387] file 118784 [ 2842.112228][T10387] kernel 122880 [ 2842.112228][T10387] kernel_stack 0 [ 2842.112228][T10387] pagetables 0 [ 2842.112228][T10387] percpu 0 [ 2842.112228][T10387] sock 651264 [ 2842.112228][T10387] vmalloc 0 [ 2842.112228][T10387] shmem 118784 [ 2842.112228][T10387] file_mapped 118784 [ 2842.112228][T10387] file_dirty 0 [ 2842.112228][T10387] file_writeback 0 [ 2842.112228][T10387] swapcached 0 [ 2842.112228][T10387] inactive_anon 57344 [ 2842.112228][T10387] active_anon 61440 [ 2842.112228][T10387] inactive_file 0 [ 2842.112228][T10387] active_file 0 [ 2842.112228][T10387] unevictable 0 [ 2842.112228][T10387] slab_reclaimable 4632 [ 2842.112228][T10387] slab_unreclaimable 111280 [ 2842.112228][T10387] slab 115912 [ 2842.112228][T10387] workingset_refault_anon 0 [ 2842.112228][T10387] workingset_refault_file 48 [ 2842.112228][T10387] workingset_activate_anon 0 [ 2842.112228][T10387] workingset_activate_file 0 [ 2842.206299][T10387] Out of memory and no killable processes... [ 2842.212969][T10389] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2842.223206][T10389] CPU: 1 PID: 10389 Comm: syz-executor.5 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2842.233684][T10389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2842.243724][T10389] Call Trace: [ 2842.246986][T10389] [ 2842.249894][T10389] dump_stack_lvl+0xd6/0x122 [ 2842.254477][T10389] dump_stack+0x11/0x12 [ 2842.258609][T10389] dump_header+0x98/0x410 [ 2842.262915][T10389] out_of_memory+0x65e/0x880 [ 2842.267502][T10389] memory_max_write+0x31b/0x420 [ 2842.272455][T10389] ? memory_max_show+0x70/0x70 [ 2842.277277][T10389] cgroup_file_write+0x167/0x300 [ 2842.282200][T10389] ? __check_object_size+0x235/0x380 [ 2842.287462][T10389] ? cgroup_seqfile_stop+0x70/0x70 [ 2842.292562][T10389] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2842.297849][T10389] vfs_write+0x71c/0x890 [ 2842.302113][T10389] ksys_write+0xe8/0x1a0 [ 2842.306334][T10389] __x64_sys_write+0x3e/0x50 [ 2842.310956][T10389] do_syscall_64+0x2b/0x70 [ 2842.315388][T10389] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2842.321258][T10389] RIP: 0033:0x7f979ec120e9 [ 2842.325708][T10389] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2842.345313][T10389] RSP: 002b:00007f979e388168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2842.353794][T10389] RAX: ffffffffffffffda RBX: 00007f979ed24f60 RCX: 00007f979ec120e9 [ 2842.361763][T10389] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2842.369747][T10389] RBP: 00007f979ec6c08d R08: 0000000000000000 R09: 0000000000000000 [ 2842.377700][T10389] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2842.385651][T10389] R13: 00007ffe624163cf R14: 00007f979e388300 R15: 0000000000022000 [ 2842.393667][T10389] [ 2842.396877][T10389] memory: usage 872kB, limit 0kB, failcnt 13681 [ 2842.403177][T10389] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2842.410107][T10389] Memory cgroup stats for /syz0: [ 2842.412649][T10389] anon 0 [ 2842.412649][T10389] file 118784 [ 2842.412649][T10389] kernel 122880 [ 2842.412649][T10389] kernel_stack 0 [ 2842.412649][T10389] pagetables 0 [ 2842.412649][T10389] percpu 0 [ 2842.412649][T10389] sock 651264 [ 2842.412649][T10389] vmalloc 0 [ 2842.412649][T10389] shmem 118784 [ 2842.412649][T10389] file_mapped 118784 [ 2842.412649][T10389] file_dirty 0 [ 2842.412649][T10389] file_writeback 0 [ 2842.412649][T10389] swapcached 0 [ 2842.412649][T10389] inactive_anon 57344 [ 2842.412649][T10389] active_anon 61440 [ 2842.412649][T10389] inactive_file 0 [ 2842.412649][T10389] active_file 0 [ 2842.412649][T10389] unevictable 0 [ 2842.412649][T10389] slab_reclaimable 4632 [ 2842.412649][T10389] slab_unreclaimable 111280 [ 2842.412649][T10389] slab 115912 [ 2842.412649][T10389] workingset_refault_anon 0 [ 2842.412649][T10389] workingset_refault_file 48 [ 2842.412649][T10389] workingset_activate_anon 0 [ 2842.412649][T10389] workingset_activate_file 0 [ 2842.506060][T10389] Out of memory and no killable processes... 23:16:58 executing program 0: syz_genetlink_get_family_id$batadv(&(0x7f0000000100), 0xffffffffffffffff) stat(&(0x7f0000000900)='./file0\x00', 0x0) 23:16:58 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:16:58 executing program 2: syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendto$isdn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x18, 0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEV(r0, &(0x7f0000000580)={&(0x7f00000004c0), 0xc, &(0x7f0000000540)={0x0}}, 0x4000055) socketpair(0x0, 0x0, 0x0, &(0x7f00000005c0)) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x0, 0x7, &(0x7f0000000700)=@framed={{}, [@cb_func, @btf_id]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x2d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$gtp(&(0x7f00000009c0), 0xffffffffffffffff) 23:16:58 executing program 4: syz_genetlink_get_family_id$team(&(0x7f0000003300), 0xffffffffffffffff) 23:16:58 executing program 1: syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000bc0), 0xffffffffffffffff) 23:16:58 executing program 3: socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r0, 0xa, 0xffffffffffffffff, 0x2) close(0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x12) 23:16:58 executing program 4: sendto$isdn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 23:16:58 executing program 2: r0 = memfd_create(&(0x7f0000000180)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x0) sendfile(r0, r1, &(0x7f0000000100), 0x220) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x13, 0x0, &(0x7f00000000c0)) 23:16:58 executing program 1: r0 = memfd_create(&(0x7f0000000180)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x0) sendfile(r0, r1, &(0x7f0000000100), 0x220) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x83, &(0x7f0000000440)={0x0, @in={{0x2, 0x0, @broadcast}}}, &(0x7f00000000c0)=0x84) 23:16:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000003300), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000033c0)) 23:16:58 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) syz_genetlink_get_family_id$gtp(&(0x7f00000009c0), 0xffffffffffffffff) 23:16:58 executing program 1: r0 = memfd_create(&(0x7f0000000180)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x0) sendfile(r0, r1, &(0x7f0000000100), 0x220) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0xa, &(0x7f0000000440)={0x0, @in={{0x2, 0x0, @broadcast}}}, &(0x7f00000000c0)=0x84) [ 2842.790997][T10419] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2842.801411][T10419] CPU: 0 PID: 10419 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2842.811913][T10419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2842.821993][T10419] Call Trace: [ 2842.825287][T10419] [ 2842.828242][T10419] dump_stack_lvl+0xd6/0x122 [ 2842.832847][T10419] dump_stack+0x11/0x12 [ 2842.837012][T10419] dump_header+0x98/0x410 [ 2842.841347][T10419] out_of_memory+0x65e/0x880 [ 2842.846003][T10419] memory_max_write+0x31b/0x420 [ 2842.850869][T10419] ? memory_max_show+0x70/0x70 [ 2842.855710][T10419] cgroup_file_write+0x167/0x300 [ 2842.860659][T10419] ? __check_object_size+0x235/0x380 [ 2842.865947][T10419] ? cgroup_seqfile_stop+0x70/0x70 [ 2842.871066][T10419] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2842.876375][T10419] vfs_write+0x71c/0x890 [ 2842.880627][T10419] ksys_write+0xe8/0x1a0 [ 2842.884899][T10419] __x64_sys_write+0x3e/0x50 [ 2842.889498][T10419] do_syscall_64+0x2b/0x70 [ 2842.893999][T10419] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2842.899903][T10419] RIP: 0033:0x7fce18d590e9 [ 2842.904321][T10419] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2842.924019][T10419] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2842.932441][T10419] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2842.940476][T10419] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000e [ 2842.948455][T10419] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2842.956427][T10419] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2842.964407][T10419] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2842.972379][T10419] [ 2842.975488][T10419] memory: usage 864kB, limit 0kB, failcnt 13681 [ 2842.981787][T10419] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2842.988748][T10419] Memory cgroup stats for /syz0: [ 2843.011204][T10419] anon 0 [ 2843.011204][T10419] file 118784 [ 2843.011204][T10419] kernel 114688 [ 2843.011204][T10419] kernel_stack 0 [ 2843.011204][T10419] pagetables 0 [ 2843.011204][T10419] percpu 0 [ 2843.011204][T10419] sock 651264 [ 2843.011204][T10419] vmalloc 0 [ 2843.011204][T10419] shmem 118784 [ 2843.011204][T10419] file_mapped 118784 [ 2843.011204][T10419] file_dirty 0 [ 2843.011204][T10419] file_writeback 0 [ 2843.011204][T10419] swapcached 0 [ 2843.011204][T10419] inactive_anon 57344 [ 2843.011204][T10419] active_anon 61440 [ 2843.011204][T10419] inactive_file 0 [ 2843.011204][T10419] active_file 0 [ 2843.011204][T10419] unevictable 0 [ 2843.011204][T10419] slab_reclaimable 3256 [ 2843.011204][T10419] slab_unreclaimable 107736 [ 2843.011204][T10419] slab 110992 [ 2843.011204][T10419] workingset_refault_anon 0 [ 2843.011204][T10419] workingset_refault_file 48 [ 2843.011204][T10419] workingset_activate_anon 0 [ 2843.011204][T10419] workingset_activate_file 0 [ 2843.105734][T10419] Out of memory and no killable processes... [ 2843.111934][T10425] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2843.122310][T10425] CPU: 0 PID: 10425 Comm: syz-executor.5 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2843.132809][T10425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2843.142860][T10425] Call Trace: [ 2843.146135][T10425] [ 2843.149139][T10425] dump_stack_lvl+0xd6/0x122 [ 2843.153796][T10425] dump_stack+0x11/0x12 [ 2843.157959][T10425] dump_header+0x98/0x410 [ 2843.162295][T10425] out_of_memory+0x65e/0x880 [ 2843.167031][T10425] memory_max_write+0x31b/0x420 [ 2843.171890][T10425] ? memory_max_show+0x70/0x70 [ 2843.176691][T10425] cgroup_file_write+0x167/0x300 [ 2843.181643][T10425] ? cgroup_seqfile_stop+0x70/0x70 [ 2843.186765][T10425] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2843.192202][T10425] vfs_write+0x71c/0x890 [ 2843.196460][T10425] ksys_write+0xe8/0x1a0 [ 2843.200754][T10425] __x64_sys_write+0x3e/0x50 [ 2843.205357][T10425] do_syscall_64+0x2b/0x70 [ 2843.209785][T10425] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2843.215818][T10425] RIP: 0033:0x7f979ec120e9 [ 2843.220232][T10425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2843.239898][T10425] RSP: 002b:00007f979e367168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2843.248402][T10425] RAX: ffffffffffffffda RBX: 00007f979ed25030 RCX: 00007f979ec120e9 [ 2843.256410][T10425] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2843.264391][T10425] RBP: 00007f979ec6c08d R08: 0000000000000000 R09: 0000000000000000 [ 2843.272443][T10425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2843.280466][T10425] R13: 00007ffe624163cf R14: 00007f979e367300 R15: 0000000000022000 [ 2843.288444][T10425] [ 2843.291506][T10425] memory: usage 864kB, limit 0kB, failcnt 13681 [ 2843.297977][T10425] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2843.304938][T10425] Memory cgroup stats for /syz0: [ 2843.310112][T10425] anon 0 [ 2843.310112][T10425] file 118784 [ 2843.310112][T10425] kernel 114688 [ 2843.310112][T10425] kernel_stack 0 [ 2843.310112][T10425] pagetables 0 [ 2843.310112][T10425] percpu 0 [ 2843.310112][T10425] sock 651264 [ 2843.310112][T10425] vmalloc 0 [ 2843.310112][T10425] shmem 118784 [ 2843.310112][T10425] file_mapped 118784 [ 2843.310112][T10425] file_dirty 0 [ 2843.310112][T10425] file_writeback 0 [ 2843.310112][T10425] swapcached 0 [ 2843.310112][T10425] inactive_anon 57344 [ 2843.310112][T10425] active_anon 61440 [ 2843.310112][T10425] inactive_file 0 [ 2843.310112][T10425] active_file 0 [ 2843.310112][T10425] unevictable 0 [ 2843.310112][T10425] slab_reclaimable 3256 [ 2843.310112][T10425] slab_unreclaimable 107736 [ 2843.310112][T10425] slab 110992 [ 2843.310112][T10425] workingset_refault_anon 0 [ 2843.310112][T10425] workingset_refault_file 48 [ 2843.310112][T10425] workingset_activate_anon 0 [ 2843.310112][T10425] workingset_activate_file 0 [ 2843.404125][T10425] Out of memory and no killable processes... [ 2843.516712][T29609] device hsr_slave_0 left promiscuous mode [ 2843.522731][T29609] device hsr_slave_1 left promiscuous mode [ 2843.530682][T29609] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2843.538132][T29609] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2843.547186][T29609] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2843.554592][T29609] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2843.562282][T29609] device bridge_slave_1 left promiscuous mode [ 2843.568548][T29609] bridge0: port 2(bridge_slave_1) entered disabled state [ 2843.576415][T29609] device bridge_slave_0 left promiscuous mode [ 2843.582508][T29609] bridge0: port 1(bridge_slave_0) entered disabled state [ 2843.592396][T29609] device veth1_macvtap left promiscuous mode [ 2843.598446][T29609] device veth0_macvtap left promiscuous mode [ 2843.604425][T29609] device veth1_vlan left promiscuous mode [ 2843.610166][T29609] device veth0_vlan left promiscuous mode [ 2843.690367][T29609] team0 (unregistering): Port device team_slave_1 removed [ 2843.699960][T29609] team0 (unregistering): Port device team_slave_0 removed [ 2843.709425][T29609] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2843.720399][T29609] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2843.750579][T29609] bond0 (unregistering): Released all slaves [ 2844.623832][T10439] chnl_net:caif_netlink_parms(): no params data found [ 2844.652918][T10439] bridge0: port 1(bridge_slave_0) entered blocking state [ 2844.659983][T10439] bridge0: port 1(bridge_slave_0) entered disabled state [ 2844.667749][T10439] device bridge_slave_0 entered promiscuous mode [ 2844.675082][T10439] bridge0: port 2(bridge_slave_1) entered blocking state [ 2844.682243][T10439] bridge0: port 2(bridge_slave_1) entered disabled state [ 2844.689820][T10439] device bridge_slave_1 entered promiscuous mode [ 2844.705420][T10439] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2844.715842][T10439] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2844.733245][T10439] team0: Port device team_slave_0 added [ 2844.739701][T10439] team0: Port device team_slave_1 added [ 2844.752535][T10439] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2844.759494][T10439] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2844.785369][T10439] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2844.797028][T10439] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2844.803942][T10439] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2844.829912][T10439] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2844.853009][T10439] device hsr_slave_0 entered promiscuous mode [ 2844.859655][T10439] device hsr_slave_1 entered promiscuous mode [ 2844.866140][T10439] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2844.873665][T10439] Cannot create hsr debugfs directory [ 2844.901120][T10439] bridge0: port 2(bridge_slave_1) entered blocking state [ 2844.908234][T10439] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2844.915496][T10439] bridge0: port 1(bridge_slave_0) entered blocking state [ 2844.922657][T10439] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2844.948819][T10439] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2844.959386][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2844.967689][ T76] bridge0: port 1(bridge_slave_0) entered disabled state [ 2844.975623][ T76] bridge0: port 2(bridge_slave_1) entered disabled state [ 2844.986900][T10439] 8021q: adding VLAN 0 to HW filter on device team0 [ 2844.998154][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2845.006435][ T6136] bridge0: port 1(bridge_slave_0) entered blocking state [ 2845.013490][ T6136] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2845.021305][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2845.029631][ T6136] bridge0: port 2(bridge_slave_1) entered blocking state [ 2845.036707][ T6136] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2845.055015][T10439] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2845.065372][T10439] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2845.080846][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2845.089658][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2845.098296][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2845.106763][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2845.115205][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2845.122902][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2845.137599][T10439] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2845.144585][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2845.152163][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2845.216595][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2845.257227][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2845.266092][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2845.273883][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2845.282101][T10439] device veth0_vlan entered promiscuous mode [ 2845.292187][T10439] device veth1_vlan entered promiscuous mode [ 2845.304823][T10439] device veth0_macvtap entered promiscuous mode [ 2845.313228][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2845.321327][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2845.329513][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2845.337995][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2845.346796][T10439] device veth1_macvtap entered promiscuous mode [ 2845.357094][T10439] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2845.367510][T10439] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2845.377342][T10439] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2845.387848][T10439] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2845.397655][T10439] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2845.408068][T10439] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2845.417886][T10439] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2845.428313][T10439] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2845.438151][T10439] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2845.448553][T10439] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2845.458542][T10439] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2845.468951][T10439] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2845.479871][T10439] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2845.488143][T10439] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2845.498600][T10439] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2845.508456][T10439] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2845.518864][T10439] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2845.528730][T10439] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2845.539138][T10439] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2845.548950][T10439] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2845.559432][T10439] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2845.569272][T10439] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2845.579696][T10439] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2845.589566][T10439] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2845.599970][T10439] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2845.611090][T10439] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2845.621098][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2845.629803][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2845.639599][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2845.648184][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 23:17:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0x1b, 0x0, 0x0, @empty}}}, 0x30) 23:17:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000003740)={&(0x7f0000003380), 0xc, &(0x7f0000003700)={0x0}}, 0x1) 23:17:01 executing program 4: syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) socketpair(0x18, 0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEV(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000005c0)) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x0, 0x3, &(0x7f0000000700)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$gtp(&(0x7f00000009c0), 0xffffffffffffffff) 23:17:01 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) pipe2$watch_queue(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$inet6_dccp_int(r1, 0x21, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) sendmmsg$inet6(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x5}}, 0x1c, 0x0}}], 0x1, 0x0) pipe2$watch_queue(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$inet6_dccp_int(r2, 0x21, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_LEAVE_MESH(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbff, {{}, {@void, @void}}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4008091}, 0x24000090) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={@private2, 0x0, r4}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x4a, r4}) 23:17:01 executing program 3: socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r0, 0xa, 0xffffffffffffffff, 0x2) close(0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x12) 23:17:01 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:01 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x5}, 0x6e) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2c02", 0x2}], 0x1}, 0x0) [ 2845.725167][T10487] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 2845.749410][T10439] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2845.759433][T10439] CPU: 0 PID: 10439 Comm: syz-executor.0 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2845.769937][T10439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2845.779992][T10439] Call Trace: [ 2845.783270][T10439] [ 2845.786197][T10439] dump_stack_lvl+0xd6/0x122 [ 2845.790791][T10439] dump_stack+0x11/0x12 [ 2845.794948][T10439] dump_header+0x98/0x410 [ 2845.799286][T10439] oom_kill_process+0xfe/0x550 [ 2845.804053][T10439] out_of_memory+0x620/0x880 [ 2845.808645][T10439] mem_cgroup_oom+0x475/0x4f0 [ 2845.813329][T10439] try_charge_memcg+0x746/0x960 [ 2845.818184][T10439] ? load_balance+0x88a/0xcd0 23:17:01 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:01 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000015c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2={0x2}}, 0x1c, 0x0}}, {{&(0x7f0000000180)={0xa, 0x4e22, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=ANY=[], 0xd0}}], 0x2, 0x0) 23:17:01 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000004c0)={'batadv_slave_1\x00', 0x0}) sendmmsg$inet6(r0, &(0x7f00000009c0)=[{{&(0x7f0000000040)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c, 0x0, 0x0, &(0x7f0000000500)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @remote}, r1}}}], 0x28}}], 0x1, 0x0) 23:17:01 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f3, &(0x7f0000000680)={'ip6_vti0\x00', 0x0}) [ 2845.822873][T10439] obj_cgroup_charge+0x171/0x2b0 [ 2845.827815][T10439] memcg_slab_pre_alloc_hook+0xf7/0x170 [ 2845.833367][T10439] ? __d_alloc+0x3d/0x380 [ 2845.837692][T10439] kmem_cache_alloc_lru+0x76/0x2b0 [ 2845.842847][T10439] ? cgroup_rstat_updated+0x88/0x1c0 [ 2845.848116][T10439] __d_alloc+0x3d/0x380 [ 2845.852323][T10439] d_alloc_parallel+0x51/0xcc0 [ 2845.857083][T10439] ? selinux_inode_permission+0x2d8/0x400 [ 2845.862787][T10439] ? selinux_inode_permission+0x335/0x400 [ 2845.868526][T10439] ? lockref_get_not_dead+0xeb/0x190 [ 2845.873854][T10439] ? __rcu_read_unlock+0x4a/0x70 [ 2845.878914][T10439] ? __down_read_common+0x16c/0x4c0 [ 2845.884119][T10439] __lookup_slow+0x80/0x250 [ 2845.888690][T10439] lookup_slow+0x3c/0x60 [ 2845.892932][T10439] walk_component+0x23d/0x280 [ 2845.897758][T10439] path_lookupat+0x11d/0x2b0 [ 2845.902377][T10439] filename_lookup+0x130/0x310 [ 2845.907148][T10439] user_path_at_empty+0x3e/0x110 [ 2845.912128][T10439] __x64_sys_umount+0x84/0xe0 [ 2845.916803][T10439] do_syscall_64+0x2b/0x70 23:17:01 executing program 1: socket$inet(0x2, 0x0, 0x8001) [ 2845.921254][T10439] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2845.927273][T10439] RIP: 0033:0x7fd6a4f08557 [ 2845.931680][T10439] Code: ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2845.951285][T10439] RSP: 002b:00007ffe9c54d3a8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 2845.959701][T10439] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd6a4f08557 [ 2845.967708][T10439] RDX: 00007ffe9c54d47e RSI: 000000000000000a RDI: 00007ffe9c54d470 [ 2845.975681][T10439] RBP: 00007ffe9c54d470 R08: 00000000ffffffff R09: 00007ffe9c54d240 [ 2845.983651][T10439] R10: 0000555555d20773 R11: 0000000000000246 R12: 00007fd6a4f601f8 [ 2845.991659][T10439] R13: 00007ffe9c54e530 R14: 0000555555d206f0 R15: 00007ffe9c54e570 [ 2845.999636][T10439] [ 2846.002764][T10439] memory: usage 924kB, limit 0kB, failcnt 13700 [ 2846.009038][T10439] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2846.015899][T10439] Memory cgroup stats for /syz0: [ 2846.018633][T10439] anon 36864 [ 2846.018633][T10439] file 118784 [ 2846.018633][T10439] kernel 135168 [ 2846.018633][T10439] kernel_stack 0 [ 2846.018633][T10439] pagetables 8192 [ 2846.018633][T10439] percpu 0 [ 2846.018633][T10439] sock 651264 [ 2846.018633][T10439] vmalloc 0 [ 2846.018633][T10439] shmem 118784 [ 2846.018633][T10439] file_mapped 118784 [ 2846.018633][T10439] file_dirty 0 [ 2846.018633][T10439] file_writeback 0 [ 2846.018633][T10439] swapcached 0 [ 2846.018633][T10439] inactive_anon 94208 [ 2846.018633][T10439] active_anon 61440 [ 2846.018633][T10439] inactive_file 0 [ 2846.018633][T10439] active_file 0 [ 2846.018633][T10439] unevictable 0 [ 2846.018633][T10439] slab_reclaimable 4632 [ 2846.018633][T10439] slab_unreclaimable 111520 [ 2846.018633][T10439] slab 116152 [ 2846.018633][T10439] workingset_refault_anon 0 [ 2846.018633][T10439] workingset_refault_file 48 [ 2846.018633][T10439] workingset_activate_anon 0 [ 2846.018633][T10439] workingset_activate_file 0 [ 2846.112697][T10439] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=10439,uid=0 [ 2846.127955][T10439] Memory cgroup out of memory: Killed process 10439 (syz-executor.0) total-vm:42336kB, anon-rss:364kB, file-rss:8192kB, shmem-rss:0kB, UID:0 pgtables:68kB oom_score_adj:0 [ 2846.160317][T10486] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2846.170609][T10486] CPU: 0 PID: 10486 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2846.181126][T10486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2846.191244][T10486] Call Trace: [ 2846.194500][T10486] [ 2846.197410][T10486] dump_stack_lvl+0xd6/0x122 [ 2846.201985][T10486] dump_stack+0x11/0x12 [ 2846.206171][T10486] dump_header+0x98/0x410 [ 2846.210489][T10486] out_of_memory+0x65e/0x880 [ 2846.215085][T10486] memory_max_write+0x31b/0x420 [ 2846.219942][T10486] ? memory_max_show+0x70/0x70 [ 2846.224757][T10486] cgroup_file_write+0x167/0x300 [ 2846.229676][T10486] ? __check_object_size+0x235/0x380 [ 2846.234939][T10486] ? cgroup_seqfile_stop+0x70/0x70 [ 2846.240061][T10486] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2846.245329][T10486] vfs_write+0x71c/0x890 [ 2846.249606][T10486] ksys_write+0xe8/0x1a0 [ 2846.253846][T10486] __x64_sys_write+0x3e/0x50 [ 2846.258505][T10486] do_syscall_64+0x2b/0x70 [ 2846.262947][T10486] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2846.268868][T10486] RIP: 0033:0x7fce18d590e9 [ 2846.273303][T10486] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2846.292905][T10486] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2846.301341][T10486] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2846.309298][T10486] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000e [ 2846.317281][T10486] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2846.325233][T10486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2846.333205][T10486] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2846.341198][T10486] [ 2846.345046][T10486] memory: usage 872kB, limit 0kB, failcnt 13717 [ 2846.351436][T10486] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2846.358296][T10486] Memory cgroup stats for /syz0: [ 2846.359278][T10486] anon 0 [ 2846.359278][T10486] file 118784 [ 2846.359278][T10486] kernel 122880 [ 2846.359278][T10486] kernel_stack 0 [ 2846.359278][T10486] pagetables 0 [ 2846.359278][T10486] percpu 0 [ 2846.359278][T10486] sock 651264 [ 2846.359278][T10486] vmalloc 0 [ 2846.359278][T10486] shmem 118784 [ 2846.359278][T10486] file_mapped 118784 [ 2846.359278][T10486] file_dirty 0 [ 2846.359278][T10486] file_writeback 0 [ 2846.359278][T10486] swapcached 0 [ 2846.359278][T10486] inactive_anon 57344 [ 2846.359278][T10486] active_anon 61440 [ 2846.359278][T10486] inactive_file 0 [ 2846.359278][T10486] active_file 0 [ 2846.359278][T10486] unevictable 0 [ 2846.359278][T10486] slab_reclaimable 4632 [ 2846.359278][T10486] slab_unreclaimable 111280 [ 2846.359278][T10486] slab 115912 [ 2846.359278][T10486] workingset_refault_anon 0 [ 2846.359278][T10486] workingset_refault_file 48 [ 2846.359278][T10486] workingset_activate_anon 0 [ 2846.359278][T10486] workingset_activate_file 0 [ 2846.452916][T10486] Out of memory and no killable processes... 23:17:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000000880)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000640)={0x14}, 0x14}}, 0x0) 23:17:02 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001380)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @ipv4}, 0x1c, 0x0, 0x0, &(0x7f0000000500)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @local}}}}], 0x28}}], 0x1, 0x0) 23:17:02 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000340)={&(0x7f0000000080), 0xc, &(0x7f0000000000)={&(0x7f0000000280)={0x14}, 0xff2c}}, 0x0) 23:17:02 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:02 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000000)={'syztnl2\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @empty}}) 23:17:02 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:02 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x541b, &(0x7f0000000680)={'ip6_vti0\x00', 0x0}) 23:17:02 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004f80)=[{{&(0x7f0000001480)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, &(0x7f00000036c0)=[{&(0x7f0000002500)="257ca4ddf91f7933fe7f4439cbc6138051578ce4c3b26b1c468e934230450b7f469341bb84d719faf12f3ee3ad4a5f56a6bc95b9c2554af4e83aa02c4cce2d26068f48263ba78088e55f8fd41e8f03fb8949169c66e0563770200bdbfa56d953b140aa636433f66637dc7f3fceb3af3a19de5947df7f9a1ec3173d1be4b7d331d3b7a3f460b4fbe2c3ee8641d8d9c1a144b4cf3ac7a0e6cc44c1452eb659a8e5fd751fb04bb043e5fec388b1a81d0e612354b2893c12a9fa16d41d49a261", 0xbe}, {&(0x7f00000025c0)="3f4cb1651c9ce02833c51ca32f8ce31517431723b955bc6a3fffc1ceb749fb5995ac53e5fb6bd982762224755609526a3d5cfa876c9fc3ecd0ddad1322f81b901601b7eac310c616aae4dc37a1415145d1844500e522ff16879cc291dab5613464d25a1c81d36cb45487724889023fbc0a70927f964b348a58ea9787c833e020916398f155d9ca03c5ebae1fad5e77bce4f4d98cc2add1de1a55ccd3544de285711e9ccd6eaea95ec465a508fcb9bf73dd67b7324d255f1044f9bd729b2853cd3a5004e5ac9f2edf148780fe95ede69f7e31d3f7b50ec702d827a6bde5fd692adf5df9126e40567854bba46659f30b0ddded62ef55fc56b766dbc1473e706a914e96592752ba5f493af5c66e1a880b0c21f1873c307497f0e69a7fd028c3664743f1c69cfccee81230e08cde9cace56cbba8e6e50249cdd0efda986903dda4210f6bb00570cddf5acb74e790edd490e4d1888148325590da8bdc4a5b28ff11a071a8692fa3d83987c4d501756349cae4c75e301e120695046c0c24e5ac02958f9c7f8ad2be806b42d874e4aa86a91eb1e7699eab63c895a1b49c4ac5cb6c83f360c2edf906f5ac5123542192e6d59e3a1155e14e398bf538f10696eb137cff53b498eb8e4b47168f4f28a607d1f1cf1063f4125930a088688041d44e2cbbf375e7a56c7b773df32692ad4635c0e086b3407bc4da68a5b1778330b5fa40aca54cb7415296e5bb343337a6a975f7798949ea9576d8c2707e778756da7d424c5bc2af16513c381238867727725992c9071b167db96783c812aa575e96e58782aa5a8b6bf49629e7489159a182b6776401f8d399a7c2af6ae3b477141749d1dbd1cf3082ee9ee4137ec4a0a77f7ae80c1429e489cb23856043788785a4b9bf5fa25f911b432b8aec880b2691827beffe6dd2ec9606f771826d3b1f868806a3a13935b29f5361bb29de3f8690d3ec071db15578a5c2d31c060c34eee5e5fb484809020c6c716321a63f4ac0644f1fed52380ac3471881da80d26f7ae6af6f3ab2116073fbe56832fba34d542e6181ada377d869c1322f28491b0e7b5e819a82a265f7d2dc493388120375dd2938b2b4002082b36f739fbc45cc792cf419459e4b47c499ef7b2278f15092fe08546f6a29ebdaf4830d064aff1511ad1ee45856fbf3e779109027a8da406765fbc5f0d9938f8748ee5a4a93809faf6d1be8c127e2f64f8e2cc1f97d0fb41ea93e8332d1dde8f3c0b8bf1f137c04645e2078a83e4e53571baa26c7f26d72735913644165a4cb5d077701467558bd77e6bffa855993207d3d9c9c76c550dc38b0071675db33850bbe33e786b74c046a1cd0ecfcec19be23fde2d466ac558dd009ef5a4945122dd1613c8b8469b7aaac57e549fb2283e2d4894e19d60245c2abe45e9135195963f9ca11a74830c89d58e99ff42ced3197d89a57ba3924d59a3f629cf1677021dc774cb42b82be7e4bf57c73144c2eb354d51b9efebfe7d3d51ba1d2fbeb376d5baab8ac49abc2005ad0d4d256802b5e9ed38061fe84443e25a7bef453a438ddaf34633eeaf9cd5a51c3971af6069d7edf47c89b844006c8b3d6551790df3ab12be0e40504846afb863b7583bcc57e2d9f980a11f4f7324b027c8bd17a0b71456a6ad5d412a9900418c9d2f0f9ebc30fff57c9fc0e2a2dbde91619687572ea5a8bf316e55f4ce1a904544dc850e851ad03b68dadd1cc9a3610a4129c4ad4090042a2acc9055ac6efce1556ada81aa9e872beeda5671571f2c3d03dd96039fa8f55", 0x4ef}], 0x2}}], 0x1, 0x0) 23:17:02 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x5421, 0x0) 23:17:02 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2846.570619][T10519] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2846.580876][T10519] CPU: 1 PID: 10519 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2846.591477][T10519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2846.601575][T10519] Call Trace: [ 2846.604841][T10519] [ 2846.607763][T10519] dump_stack_lvl+0xd6/0x122 [ 2846.612336][T10519] dump_stack+0x11/0x12 [ 2846.616472][T10519] dump_header+0x98/0x410 [ 2846.620780][T10519] out_of_memory+0x65e/0x880 [ 2846.625395][T10519] memory_max_write+0x31b/0x420 [ 2846.630250][T10519] ? memory_max_show+0x70/0x70 [ 2846.635039][T10519] cgroup_file_write+0x167/0x300 [ 2846.640058][T10519] ? __check_object_size+0x235/0x380 [ 2846.645370][T10519] ? cgroup_seqfile_stop+0x70/0x70 [ 2846.650460][T10519] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2846.655744][T10519] vfs_write+0x71c/0x890 [ 2846.659967][T10519] ksys_write+0xe8/0x1a0 [ 2846.664210][T10519] __x64_sys_write+0x3e/0x50 [ 2846.668780][T10519] do_syscall_64+0x2b/0x70 [ 2846.673214][T10519] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2846.679200][T10519] RIP: 0033:0x7fce18d590e9 [ 2846.683612][T10519] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2846.703243][T10519] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2846.711696][T10519] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2846.719645][T10519] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000b [ 2846.727636][T10519] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2846.735586][T10519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2846.743552][T10519] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2846.751521][T10519] [ 2846.754718][T10519] memory: usage 868kB, limit 0kB, failcnt 13717 [ 2846.761034][T10519] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2846.768020][T10519] Memory cgroup stats for /syz0: [ 2846.771402][T10519] anon 0 [ 2846.771402][T10519] file 118784 [ 2846.771402][T10519] kernel 118784 [ 2846.771402][T10519] kernel_stack 0 [ 2846.771402][T10519] pagetables 0 [ 2846.771402][T10519] percpu 0 [ 2846.771402][T10519] sock 651264 [ 2846.771402][T10519] vmalloc 0 [ 2846.771402][T10519] shmem 118784 [ 2846.771402][T10519] file_mapped 118784 [ 2846.771402][T10519] file_dirty 0 [ 2846.771402][T10519] file_writeback 0 [ 2846.771402][T10519] swapcached 0 23:17:02 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000000)={'syztnl2\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @empty}}) [ 2846.771402][T10519] inactive_anon 57344 [ 2846.771402][T10519] active_anon 61440 [ 2846.771402][T10519] inactive_file 0 [ 2846.771402][T10519] active_file 0 [ 2846.771402][T10519] unevictable 0 [ 2846.771402][T10519] slab_reclaimable 4632 [ 2846.771402][T10519] slab_unreclaimable 107736 [ 2846.771402][T10519] slab 112368 [ 2846.771402][T10519] workingset_refault_anon 0 [ 2846.771402][T10519] workingset_refault_file 48 [ 2846.771402][T10519] workingset_activate_anon 0 [ 2846.771402][T10519] workingset_activate_file 0 [ 2846.864889][T10519] Out of memory and no killable processes... 23:17:02 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vxcan0\x00'}) [ 2846.948448][T10527] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:17:02 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004f80)=[{{&(0x7f0000001480)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, &(0x7f00000036c0)=[{&(0x7f0000002500)="257ca4ddf91f7933fe7f4439cbc6138051578ce4c3b26b1c468e934230450b7f469341bb84d719faf12f3ee3ad4a5f56a6bc95b9c2554af4e83aa02c4cce2d26068f48263ba78088e55f8fd41e8f03fb8949169c66e0563770200bdbfa56d953b140aa636433f66637dc7f3fceb3af3a19de5947df7f9a1ec3173d1be4b7d331d3b7a3f460b4fbe2c3ee8641d8d9c1a144b4cf3ac7a0e6cc44c1452eb659a8e5fd751fb04bb043e5fec388b1a81d0e612354b2893c12a9fa16d41d49a261", 0xbe}, {&(0x7f00000025c0)="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", 0x4ef}], 0x2}}], 0x1, 0x0) 23:17:02 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:02 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000008c0)={'syztnl2\x00', 0x0}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000cc0), 0xffffffffffffffff) 23:17:02 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:02 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x40049409, &(0x7f0000000680)={'ip6_vti0\x00', 0x0}) 23:17:02 executing program 4: socketpair(0xb, 0x0, 0x0, &(0x7f0000000080)) [ 2847.224265][T10549] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2847.234482][T10549] CPU: 0 PID: 10549 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2847.245108][T10549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2847.255176][T10549] Call Trace: [ 2847.258454][T10549] [ 2847.261384][T10549] dump_stack_lvl+0xd6/0x122 [ 2847.266049][T10549] dump_stack+0x11/0x12 [ 2847.270235][T10549] dump_header+0x98/0x410 [ 2847.274575][T10549] out_of_memory+0x65e/0x880 [ 2847.279169][T10549] memory_max_write+0x31b/0x420 [ 2847.284096][T10549] ? memory_max_show+0x70/0x70 [ 2847.288879][T10549] cgroup_file_write+0x167/0x300 [ 2847.293821][T10549] ? __check_object_size+0x235/0x380 [ 2847.299108][T10549] ? cgroup_seqfile_stop+0x70/0x70 [ 2847.304224][T10549] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2847.309570][T10549] vfs_write+0x71c/0x890 [ 2847.313885][T10549] ksys_write+0xe8/0x1a0 [ 2847.318133][T10549] __x64_sys_write+0x3e/0x50 [ 2847.322845][T10549] do_syscall_64+0x2b/0x70 [ 2847.327280][T10549] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2847.333180][T10549] RIP: 0033:0x7fce18d590e9 [ 2847.337673][T10549] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2847.357401][T10549] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2847.365894][T10549] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2847.373873][T10549] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000b [ 2847.381891][T10549] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2847.389857][T10549] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2847.397825][T10549] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2847.405798][T10549] [ 2847.408982][T10549] memory: usage 864kB, limit 0kB, failcnt 13717 [ 2847.415234][T10549] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2847.422079][T10549] Memory cgroup stats for /syz0: [ 2847.425645][T10549] anon 0 [ 2847.425645][T10549] file 118784 [ 2847.425645][T10549] kernel 114688 [ 2847.425645][T10549] kernel_stack 0 [ 2847.425645][T10549] pagetables 0 [ 2847.425645][T10549] percpu 0 [ 2847.425645][T10549] sock 651264 [ 2847.425645][T10549] vmalloc 0 [ 2847.425645][T10549] shmem 118784 [ 2847.425645][T10549] file_mapped 118784 [ 2847.425645][T10549] file_dirty 0 [ 2847.425645][T10549] file_writeback 0 [ 2847.425645][T10549] swapcached 0 [ 2847.425645][T10549] inactive_anon 57344 [ 2847.425645][T10549] active_anon 61440 [ 2847.425645][T10549] inactive_file 0 [ 2847.425645][T10549] active_file 0 [ 2847.425645][T10549] unevictable 0 [ 2847.425645][T10549] slab_reclaimable 3256 [ 2847.425645][T10549] slab_unreclaimable 107736 [ 2847.425645][T10549] slab 110992 [ 2847.425645][T10549] workingset_refault_anon 0 [ 2847.425645][T10549] workingset_refault_file 48 [ 2847.425645][T10549] workingset_activate_anon 0 [ 2847.425645][T10549] workingset_activate_file 0 [ 2847.519245][T10549] Out of memory and no killable processes... [ 2847.540018][T29580] device hsr_slave_0 left promiscuous mode [ 2847.546579][T29580] device hsr_slave_1 left promiscuous mode [ 2847.553116][T29580] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2847.560594][T29580] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2847.568429][T29580] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2847.575930][T29580] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2847.583980][T29580] device bridge_slave_1 left promiscuous mode [ 2847.590268][T29580] bridge0: port 2(bridge_slave_1) entered disabled state [ 2847.598320][T29580] device bridge_slave_0 left promiscuous mode [ 2847.604437][T29580] bridge0: port 1(bridge_slave_0) entered disabled state [ 2847.615165][T29580] device veth1_macvtap left promiscuous mode [ 2847.621152][T29580] device veth0_macvtap left promiscuous mode [ 2847.627350][T29580] device veth1_vlan left promiscuous mode [ 2847.633132][T29580] device veth0_vlan left promiscuous mode [ 2847.725136][T29580] team0 (unregistering): Port device team_slave_1 removed [ 2847.734294][T29580] team0 (unregistering): Port device team_slave_0 removed [ 2847.743962][T29580] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2847.757008][T29580] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2847.785687][T29580] bond0 (unregistering): Released all slaves [ 2848.702141][T10560] chnl_net:caif_netlink_parms(): no params data found [ 2848.732313][T10560] bridge0: port 1(bridge_slave_0) entered blocking state [ 2848.739494][T10560] bridge0: port 1(bridge_slave_0) entered disabled state [ 2848.747050][T10560] device bridge_slave_0 entered promiscuous mode [ 2848.754116][T10560] bridge0: port 2(bridge_slave_1) entered blocking state [ 2848.761383][T10560] bridge0: port 2(bridge_slave_1) entered disabled state [ 2848.769319][T10560] device bridge_slave_1 entered promiscuous mode [ 2848.785278][T10560] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2848.795566][T10560] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2848.813173][T10560] team0: Port device team_slave_0 added [ 2848.819686][T10560] team0: Port device team_slave_1 added [ 2848.833848][T10560] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2848.840814][T10560] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2848.866766][T10560] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2848.879540][T10560] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2848.886489][T10560] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2848.912368][T10560] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2848.933197][T10560] device hsr_slave_0 entered promiscuous mode [ 2848.939688][T10560] device hsr_slave_1 entered promiscuous mode [ 2848.946027][T10560] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2848.953546][T10560] Cannot create hsr debugfs directory [ 2848.999379][T10560] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2849.009720][ T1995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2849.017444][ T1995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2849.026954][T10560] 8021q: adding VLAN 0 to HW filter on device team0 [ 2849.036698][ T1995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2849.045547][ T1995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2849.053696][ T1995] bridge0: port 1(bridge_slave_0) entered blocking state [ 2849.060723][ T1995] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2849.068952][ T1995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2849.077932][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2849.086568][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2849.094870][ T1910] bridge0: port 2(bridge_slave_1) entered blocking state [ 2849.101948][ T1910] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2849.115131][ T1995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2849.123812][ T1995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2849.134168][ T1995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2849.142437][ T1995] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2849.151394][ T1995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2849.159766][ T1995] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2849.168602][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2849.180427][T10560] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2849.190813][T10560] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2849.202911][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2849.211186][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2849.219608][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2849.232954][T10560] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2849.240250][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2849.247749][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2849.319126][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2849.359582][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2849.367994][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2849.376126][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2849.384630][T10560] device veth0_vlan entered promiscuous mode [ 2849.393492][T10560] device veth1_vlan entered promiscuous mode [ 2849.405656][ T1995] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2849.413582][ T1995] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2849.423002][ T1995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2849.432623][T10560] device veth0_macvtap entered promiscuous mode [ 2849.440964][T10560] device veth1_macvtap entered promiscuous mode [ 2849.451467][T10560] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2849.461959][T10560] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2849.471778][T10560] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2849.482195][T10560] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2849.492013][T10560] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2849.502462][T10560] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2849.512286][T10560] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2849.522802][T10560] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2849.532716][T10560] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2849.543149][T10560] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2849.552971][T10560] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2849.563372][T10560] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2849.574113][T10560] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2849.582076][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2849.591160][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2849.599583][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2849.610503][T10560] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2849.620950][T10560] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2849.630979][T10560] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2849.641447][T10560] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2849.651257][T10560] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2849.661722][T10560] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2849.671634][T10560] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2849.682044][T10560] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2849.691854][T10560] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2849.702264][T10560] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2849.712094][T10560] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2849.722536][T10560] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2849.733538][T10560] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2849.742664][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2849.751440][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 23:17:05 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x8911, &(0x7f0000000680)={'ip6_vti0\x00', 0x0}) 23:17:05 executing program 1: socketpair(0x3, 0x0, 0xfac1, &(0x7f0000000000)) 23:17:05 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x3, 0x4) 23:17:05 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x24, 0x0, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={0x28, r4, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 23:17:05 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2849.834171][T10600] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2849.844411][T10600] CPU: 1 PID: 10600 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2849.854970][T10600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2849.865098][T10600] Call Trace: [ 2849.868393][T10600] [ 2849.871309][T10600] dump_stack_lvl+0xd6/0x122 [ 2849.875892][T10600] dump_stack+0x11/0x12 [ 2849.880120][T10600] dump_header+0x98/0x410 [ 2849.884445][T10600] oom_kill_process+0xfe/0x550 [ 2849.889201][T10600] out_of_memory+0x620/0x880 [ 2849.893776][T10600] memory_max_write+0x31b/0x420 [ 2849.898617][T10600] ? memory_max_show+0x70/0x70 [ 2849.903392][T10600] cgroup_file_write+0x167/0x300 [ 2849.908457][T10600] ? __check_object_size+0x235/0x380 [ 2849.913741][T10600] ? cgroup_seqfile_stop+0x70/0x70 [ 2849.918984][T10600] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2849.924279][T10600] vfs_write+0x71c/0x890 [ 2849.928599][T10600] ksys_write+0xe8/0x1a0 [ 2849.932918][T10600] __x64_sys_write+0x3e/0x50 [ 2849.937530][T10600] do_syscall_64+0x2b/0x70 [ 2849.941944][T10600] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2849.947836][T10600] RIP: 0033:0x7fce18d590e9 [ 2849.952281][T10600] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2849.971914][T10600] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 23:17:05 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$l2tp6(r0, 0x0, 0x0, 0x928, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev}, 0x20) [ 2849.980390][T10600] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2849.988408][T10600] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000b [ 2849.996362][T10600] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2850.004423][T10600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2850.012514][T10600] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2850.020598][T10600] [ 2850.023873][T10600] memory: usage 924kB, limit 0kB, failcnt 13717 23:17:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x13, 0x7, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 23:17:05 executing program 4: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='R', 0x1, 0xffffffffffffffff) keyctl$read(0xb, r0, 0x0, 0x0) [ 2850.030139][T10600] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2850.037057][T10600] Memory cgroup stats for /syz0: [ 2850.047096][T10600] anon 36864 [ 2850.047096][T10600] file 118784 [ 2850.047096][T10600] kernel 139264 [ 2850.047096][T10600] kernel_stack 0 [ 2850.047096][T10600] pagetables 8192 [ 2850.047096][T10600] percpu 0 [ 2850.047096][T10600] sock 651264 [ 2850.047096][T10600] vmalloc 0 [ 2850.047096][T10600] shmem 118784 [ 2850.047096][T10600] file_mapped 118784 [ 2850.047096][T10600] file_dirty 0 [ 2850.047096][T10600] file_writeback 0 [ 2850.047096][T10600] swapcached 0 [ 2850.047096][T10600] inactive_anon 94208 [ 2850.047096][T10600] active_anon 61440 [ 2850.047096][T10600] inactive_file 0 [ 2850.047096][T10600] active_file 0 [ 2850.047096][T10600] unevictable 0 [ 2850.047096][T10600] slab_reclaimable 8960 [ 2850.047096][T10600] slab_unreclaimable 111280 [ 2850.047096][T10600] slab 120240 [ 2850.047096][T10600] workingset_refault_anon 0 [ 2850.047096][T10600] workingset_refault_file 48 [ 2850.047096][T10600] workingset_activate_anon 0 [ 2850.047096][T10600] workingset_activate_file 0 [ 2850.141190][T10600] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=10560,uid=0 [ 2850.156464][T10600] Memory cgroup out of memory: Killed process 10560 (syz-executor.0) total-vm:42336kB, anon-rss:368kB, file-rss:8192kB, shmem-rss:0kB, UID:0 pgtables:68kB oom_score_adj:0 23:17:06 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2850.178069][T10600] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2850.188289][T10600] CPU: 1 PID: 10600 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2850.198769][T10600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2850.208809][T10600] Call Trace: [ 2850.212070][T10600] [ 2850.214980][T10600] dump_stack_lvl+0xd6/0x122 [ 2850.219590][T10600] dump_stack+0x11/0x12 [ 2850.223733][T10600] dump_header+0x98/0x410 [ 2850.228110][T10600] out_of_memory+0x65e/0x880 [ 2850.232751][T10600] memory_max_write+0x31b/0x420 [ 2850.237587][T10600] ? memory_max_show+0x70/0x70 [ 2850.242397][T10600] cgroup_file_write+0x167/0x300 [ 2850.247370][T10600] ? __check_object_size+0x235/0x380 [ 2850.252645][T10600] ? cgroup_seqfile_stop+0x70/0x70 [ 2850.257749][T10600] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2850.263022][T10600] vfs_write+0x71c/0x890 [ 2850.267244][T10600] ksys_write+0xe8/0x1a0 [ 2850.271462][T10600] __x64_sys_write+0x3e/0x50 [ 2850.276055][T10600] do_syscall_64+0x2b/0x70 [ 2850.280449][T10600] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2850.286364][T10600] RIP: 0033:0x7fce18d590e9 [ 2850.290764][T10600] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2850.310348][T10600] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2850.318784][T10600] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2850.326845][T10600] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000b [ 2850.334805][T10600] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2850.342814][T10600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2850.350764][T10600] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2850.358797][T10600] [ 2850.361837][T10600] memory: usage 872kB, limit 0kB, failcnt 13717 [ 2850.368078][T10600] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2850.374898][T10600] Memory cgroup stats for /syz0: [ 2850.377424][T10600] anon 0 [ 2850.377424][T10600] file 118784 [ 2850.377424][T10600] kernel 122880 [ 2850.377424][T10600] kernel_stack 0 [ 2850.377424][T10600] pagetables 0 [ 2850.377424][T10600] percpu 0 [ 2850.377424][T10600] sock 651264 [ 2850.377424][T10600] vmalloc 0 [ 2850.377424][T10600] shmem 118784 [ 2850.377424][T10600] file_mapped 118784 [ 2850.377424][T10600] file_dirty 0 [ 2850.377424][T10600] file_writeback 0 [ 2850.377424][T10600] swapcached 0 [ 2850.377424][T10600] inactive_anon 57344 [ 2850.377424][T10600] active_anon 61440 [ 2850.377424][T10600] inactive_file 0 23:17:06 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2850.377424][T10600] active_file 0 [ 2850.377424][T10600] unevictable 0 [ 2850.377424][T10600] slab_reclaimable 6008 [ 2850.377424][T10600] slab_unreclaimable 111280 [ 2850.377424][T10600] slab 117288 [ 2850.377424][T10600] workingset_refault_anon 0 [ 2850.377424][T10600] workingset_refault_file 48 [ 2850.377424][T10600] workingset_activate_anon 0 [ 2850.377424][T10600] workingset_activate_file 0 [ 2850.470866][T10600] Out of memory and no killable processes... 23:17:06 executing program 0: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$tcp_congestion(r0, &(0x7f00000000c0)='cubic\x00', 0x6) 23:17:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000002c40)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c, 0x0}}], 0x1, 0x844) 23:17:06 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_JOIN_OCB(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000001a"], 0x28}}, 0x0) 23:17:06 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000002c40)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c, 0x0, 0x0, &(0x7f0000001280)=[@pktinfo={{0x24, 0x29, 0x32, {@mcast2}}}], 0x28}}], 0x1, 0x0) 23:17:06 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004f80)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @remote}, 0x1c, &(0x7f0000001400)=[{&(0x7f0000000080)="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", 0x1000}, {&(0x7f0000001080)="eef697756c31cbb3ef974e879e7ad77b22d662ba54e918f8ef6732b90b8bba5d4cb2efe202689a80c81e2fd44758bd5a595069a5b388e8241cd3a54796f927616e179d6012f0400d86df79b31d39a1ceef17ee59ea28089771a5064993342ce767997461d656f6ff863503fe00078d2339fe1841cb01defe2b2d389d8d2173e677ef940ff2e3c9737a", 0x89}, {&(0x7f0000001140)="a22af38748ff3a315b27f5464bc8a9664b3e17735d7892e53c7b96d941ae28edbda5a4173c345a54fab1fdd71c593027cfaf7aa450d07289b6973330dac3995946146c390bf3125ac6cde09e3a003d3f69dee0effd33cbf7ac4e2c92e0bc650ff880f61ebda9c523", 0x68}], 0x3}}, {{&(0x7f0000001480)={0xa, 0x4e20, 0x0, @mcast1, 0x1470}, 0x1c, 0x0}}], 0x2, 0x4000000) [ 2850.767607][T10622] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2850.777840][T10622] CPU: 1 PID: 10622 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2850.788458][T10622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2850.798588][T10622] Call Trace: [ 2850.801875][T10622] [ 2850.804823][T10622] dump_stack_lvl+0xd6/0x122 [ 2850.809457][T10622] dump_stack+0x11/0x12 [ 2850.813627][T10622] dump_header+0x98/0x410 [ 2850.818004][T10622] out_of_memory+0x65e/0x880 [ 2850.822604][T10622] memory_max_write+0x31b/0x420 [ 2850.827473][T10622] ? memory_max_show+0x70/0x70 [ 2850.832315][T10622] cgroup_file_write+0x167/0x300 [ 2850.837256][T10622] ? __check_object_size+0x235/0x380 [ 2850.842541][T10622] ? cgroup_seqfile_stop+0x70/0x70 [ 2850.847727][T10622] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2850.853103][T10622] vfs_write+0x71c/0x890 [ 2850.857386][T10622] ksys_write+0xe8/0x1a0 [ 2850.861634][T10622] __x64_sys_write+0x3e/0x50 [ 2850.866294][T10622] do_syscall_64+0x2b/0x70 [ 2850.870742][T10622] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2850.876639][T10622] RIP: 0033:0x7fce18d590e9 [ 2850.881050][T10622] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2850.900793][T10622] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2850.909215][T10622] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2850.917188][T10622] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000b [ 2850.925163][T10622] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2850.933138][T10622] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2850.941111][T10622] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2850.949130][T10622] [ 2850.952286][T10622] memory: usage 864kB, limit 0kB, failcnt 13717 [ 2850.958569][T10622] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2850.965428][T10622] Memory cgroup stats for /syz0: [ 2850.971675][T10622] anon 0 [ 2850.971675][T10622] file 118784 [ 2850.971675][T10622] kernel 114688 [ 2850.971675][T10622] kernel_stack 0 [ 2850.971675][T10622] pagetables 0 [ 2850.971675][T10622] percpu 0 [ 2850.971675][T10622] sock 651264 [ 2850.971675][T10622] vmalloc 0 [ 2850.971675][T10622] shmem 118784 [ 2850.971675][T10622] file_mapped 118784 [ 2850.971675][T10622] file_dirty 0 [ 2850.971675][T10622] file_writeback 0 [ 2850.971675][T10622] swapcached 0 [ 2850.971675][T10622] inactive_anon 57344 23:17:06 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:06 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2850.971675][T10622] active_anon 61440 [ 2850.971675][T10622] inactive_file 0 [ 2850.971675][T10622] active_file 0 [ 2850.971675][T10622] unevictable 0 [ 2850.971675][T10622] slab_reclaimable 3256 [ 2850.971675][T10622] slab_unreclaimable 107736 [ 2850.971675][T10622] slab 110992 [ 2850.971675][T10622] workingset_refault_anon 0 [ 2850.971675][T10622] workingset_refault_file 48 [ 2850.971675][T10622] workingset_activate_anon 0 [ 2850.971675][T10622] workingset_activate_file 0 [ 2851.065176][T10622] Out of memory and no killable processes... 23:17:07 executing program 1: socketpair(0x11, 0xa, 0x8, &(0x7f0000000000)) 23:17:07 executing program 2: r0 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 23:17:07 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_JOIN_OCB(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000001a"], 0x28}}, 0x0) [ 2851.189177][T10629] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 23:17:07 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2851.287134][T29609] device hsr_slave_0 left promiscuous mode [ 2851.294007][T29609] device hsr_slave_1 left promiscuous mode [ 2851.305087][T29609] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2851.312612][T29609] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2851.320914][T29609] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2851.329068][T29609] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2851.337147][T29609] device bridge_slave_1 left promiscuous mode [ 2851.342672][T10640] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2851.343377][T29609] bridge0: port 2(bridge_slave_1) entered disabled state [ 2851.353419][T10640] CPU: 1 PID: 10640 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2851.370855][T10640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2851.380893][T10640] Call Trace: [ 2851.384154][T10640] [ 2851.387065][T10640] dump_stack_lvl+0xd6/0x122 [ 2851.391679][T10640] dump_stack+0x11/0x12 [ 2851.395827][T10640] dump_header+0x98/0x410 [ 2851.400141][T10640] out_of_memory+0x65e/0x880 [ 2851.404717][T10640] memory_max_write+0x31b/0x420 [ 2851.409554][T10640] ? memory_max_show+0x70/0x70 [ 2851.414442][T10640] cgroup_file_write+0x167/0x300 [ 2851.419396][T10640] ? __check_object_size+0x235/0x380 [ 2851.424727][T10640] ? cgroup_seqfile_stop+0x70/0x70 [ 2851.429839][T10640] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2851.435141][T10640] vfs_write+0x71c/0x890 [ 2851.439378][T10640] ksys_write+0xe8/0x1a0 [ 2851.443606][T10640] __x64_sys_write+0x3e/0x50 [ 2851.448209][T10640] do_syscall_64+0x2b/0x70 [ 2851.452607][T10640] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2851.458550][T10640] RIP: 0033:0x7fce18d590e9 [ 2851.462949][T10640] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2851.482577][T10640] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2851.491189][T10640] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2851.499140][T10640] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000b [ 2851.507144][T10640] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2851.515094][T10640] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2851.523042][T10640] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2851.531151][T10640] 23:17:07 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000580)={'sit0\x00', &(0x7f0000000500)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @mcast1}}) [ 2851.534227][T10640] memory: usage 864kB, limit 0kB, failcnt 13717 [ 2851.540535][T10640] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2851.547397][T10640] Memory cgroup stats for /syz0: [ 2851.550246][T10640] anon 0 [ 2851.550246][T10640] file 118784 [ 2851.550246][T10640] kernel 114688 [ 2851.550246][T10640] kernel_stack 0 [ 2851.550246][T10640] pagetables 0 [ 2851.550246][T10640] percpu 0 [ 2851.550246][T10640] sock 651264 [ 2851.550246][T10640] vmalloc 0 [ 2851.550246][T10640] shmem 118784 [ 2851.550246][T10640] file_mapped 118784 [ 2851.550246][T10640] file_dirty 0 [ 2851.550246][T10640] file_writeback 0 [ 2851.550246][T10640] swapcached 0 [ 2851.550246][T10640] inactive_anon 57344 [ 2851.550246][T10640] active_anon 61440 [ 2851.550246][T10640] inactive_file 0 [ 2851.550246][T10640] active_file 0 [ 2851.550246][T10640] unevictable 0 [ 2851.550246][T10640] slab_reclaimable 3256 [ 2851.550246][T10640] slab_unreclaimable 107736 [ 2851.550246][T10640] slab 110992 [ 2851.550246][T10640] workingset_refault_anon 0 [ 2851.550246][T10640] workingset_refault_file 48 23:17:07 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2851.550246][T10640] workingset_activate_anon 0 [ 2851.550246][T10640] workingset_activate_file 0 [ 2851.643770][T10640] Out of memory and no killable processes... [ 2851.651200][T29609] device bridge_slave_0 left promiscuous mode [ 2851.657412][T29609] bridge0: port 1(bridge_slave_0) entered disabled state [ 2851.669040][T29609] device veth1_macvtap left promiscuous mode [ 2851.669840][T10643] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2851.675144][T29609] device veth0_macvtap left promiscuous mode [ 2851.690576][T29609] device veth1_vlan left promiscuous mode [ 2851.696495][T29609] device veth0_vlan left promiscuous mode [ 2851.783522][T29609] team0 (unregistering): Port device team_slave_1 removed [ 2851.793587][T29609] team0 (unregistering): Port device team_slave_0 removed [ 2851.803806][T29609] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2851.816327][T29609] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2851.846521][T29609] bond0 (unregistering): Released all slaves [ 2851.910100][T10650] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2851.922188][T10650] CPU: 1 PID: 10650 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2851.932763][T10650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2851.942807][T10650] Call Trace: [ 2851.946072][T10650] [ 2851.949009][T10650] dump_stack_lvl+0xd6/0x122 [ 2851.953582][T10650] dump_stack+0x11/0x12 [ 2851.957740][T10650] dump_header+0x98/0x410 [ 2851.962124][T10650] out_of_memory+0x65e/0x880 [ 2851.968705][T10650] memory_max_write+0x31b/0x420 [ 2851.973625][T10650] ? memory_max_show+0x70/0x70 [ 2851.978386][T10650] cgroup_file_write+0x167/0x300 [ 2851.983309][T10650] ? __check_object_size+0x235/0x380 [ 2851.988600][T10650] ? cgroup_seqfile_stop+0x70/0x70 [ 2851.993791][T10650] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2852.000116][T10650] vfs_write+0x71c/0x890 [ 2852.004352][T10650] ksys_write+0xe8/0x1a0 [ 2852.008590][T10650] __x64_sys_write+0x3e/0x50 [ 2852.013163][T10650] do_syscall_64+0x2b/0x70 [ 2852.017565][T10650] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2852.023498][T10650] RIP: 0033:0x7fce18d590e9 [ 2852.027982][T10650] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2852.047602][T10650] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2852.056046][T10650] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2852.064117][T10650] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000b [ 2852.072144][T10650] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2852.080096][T10650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2852.088051][T10650] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2852.096008][T10650] [ 2852.099051][T10650] memory: usage 864kB, limit 0kB, failcnt 13717 [ 2852.105305][T10650] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2852.112143][T10650] Memory cgroup stats for /syz0: [ 2852.114220][T10650] anon 0 [ 2852.114220][T10650] file 118784 [ 2852.114220][T10650] kernel 114688 [ 2852.114220][T10650] kernel_stack 0 [ 2852.114220][T10650] pagetables 0 [ 2852.114220][T10650] percpu 0 [ 2852.114220][T10650] sock 651264 [ 2852.114220][T10650] vmalloc 0 [ 2852.114220][T10650] shmem 118784 [ 2852.114220][T10650] file_mapped 118784 [ 2852.114220][T10650] file_dirty 0 [ 2852.114220][T10650] file_writeback 0 [ 2852.114220][T10650] swapcached 0 [ 2852.114220][T10650] inactive_anon 57344 [ 2852.114220][T10650] active_anon 61440 [ 2852.114220][T10650] inactive_file 0 [ 2852.114220][T10650] active_file 0 [ 2852.114220][T10650] unevictable 0 [ 2852.114220][T10650] slab_reclaimable 3256 [ 2852.114220][T10650] slab_unreclaimable 107736 [ 2852.114220][T10650] slab 110992 [ 2852.114220][T10650] workingset_refault_anon 0 [ 2852.114220][T10650] workingset_refault_file 48 [ 2852.114220][T10650] workingset_activate_anon 0 [ 2852.114220][T10650] workingset_activate_file 0 [ 2852.208080][T10650] Out of memory and no killable processes... [ 2852.459177][T10655] chnl_net:caif_netlink_parms(): no params data found [ 2852.489564][T10655] bridge0: port 1(bridge_slave_0) entered blocking state [ 2852.496674][T10655] bridge0: port 1(bridge_slave_0) entered disabled state [ 2852.504465][T10655] device bridge_slave_0 entered promiscuous mode [ 2852.511849][T10655] bridge0: port 2(bridge_slave_1) entered blocking state [ 2852.519012][T10655] bridge0: port 2(bridge_slave_1) entered disabled state [ 2852.526778][T10655] device bridge_slave_1 entered promiscuous mode [ 2852.543965][T10655] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2852.557552][T10655] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2852.575357][T10655] team0: Port device team_slave_0 added [ 2852.582033][T10655] team0: Port device team_slave_1 added [ 2852.595335][T10655] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2852.602280][T10655] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2852.628258][T10655] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2852.639337][T10655] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2852.646287][T10655] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2852.672203][T10655] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2852.694011][T10655] device hsr_slave_0 entered promiscuous mode [ 2852.700634][T10655] device hsr_slave_1 entered promiscuous mode [ 2852.707146][T10655] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2852.714675][T10655] Cannot create hsr debugfs directory [ 2852.743244][T10655] bridge0: port 2(bridge_slave_1) entered blocking state [ 2852.750410][T10655] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2852.757718][T10655] bridge0: port 1(bridge_slave_0) entered blocking state [ 2852.764756][T10655] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2852.791530][T10655] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2852.802273][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2852.810475][T10079] bridge0: port 1(bridge_slave_0) entered disabled state [ 2852.818366][T10079] bridge0: port 2(bridge_slave_1) entered disabled state [ 2852.829737][T10655] 8021q: adding VLAN 0 to HW filter on device team0 [ 2852.839521][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2852.847846][ T7472] bridge0: port 1(bridge_slave_0) entered blocking state [ 2852.854857][ T7472] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2852.864677][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2852.873188][T18607] bridge0: port 2(bridge_slave_1) entered blocking state [ 2852.880235][T18607] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2852.896596][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2852.905639][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2852.916289][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2852.924078][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2852.935125][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2852.944052][T10655] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2852.957236][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2852.964606][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2852.974009][T10655] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2853.051999][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2853.095582][T10655] device veth0_vlan entered promiscuous mode [ 2853.102502][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2853.110881][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2853.118767][ T76] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2853.129122][T10655] device veth1_vlan entered promiscuous mode [ 2853.141198][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2853.149316][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2853.158659][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2853.168301][T10655] device veth0_macvtap entered promiscuous mode [ 2853.176452][T10655] device veth1_macvtap entered promiscuous mode [ 2853.187569][T10655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2853.198039][T10655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2853.207851][T10655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2853.218442][T10655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2853.228278][T10655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2853.238738][T10655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2853.249789][T10655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2853.260210][T10655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2853.270028][T10655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2853.280435][T10655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2853.290268][T10655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2853.300691][T10655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2853.311962][T10655] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2853.319566][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2853.329209][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2853.339033][T10655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2853.349470][T10655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2853.359361][T10655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2853.369771][T10655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2853.379649][T10655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2853.390056][T10655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2853.399871][T10655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2853.410281][T10655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2853.420104][T10655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2853.431289][T10655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2853.441226][T10655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2853.451682][T10655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2853.462643][T10655] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2853.472743][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2853.481416][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 23:17:09 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x2, &(0x7f0000000680)={'ip6_vti0\x00', 0x0}) 23:17:09 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:09 executing program 1: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@map, 0xffffffffffffffff, 0xa013a992f91cb739}, 0x14) 23:17:09 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_JOIN_OCB(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000001a"], 0x28}}, 0x0) 23:17:09 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x8929, &(0x7f0000000680)={'ip6_vti0\x00', 0x0}) 23:17:09 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:09 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00'}) 23:17:09 executing program 4: futex(&(0x7f0000000000), 0x4, 0x0, 0x0, &(0x7f0000000080), 0x1) 23:17:09 executing program 2: r0 = io_uring_setup(0x5ad5, &(0x7f0000000ac0)={0x0, 0xd722}) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) 23:17:09 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2853.558528][T10698] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2853.598409][T10703] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2853.608632][T10703] CPU: 0 PID: 10703 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2853.619118][T10703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2853.629171][T10703] Call Trace: [ 2853.632522][T10703] [ 2853.635435][T10703] dump_stack_lvl+0xd6/0x122 [ 2853.640012][T10703] dump_stack+0x11/0x12 [ 2853.644177][T10703] dump_header+0x98/0x410 [ 2853.648573][T10703] oom_kill_process+0xfe/0x550 [ 2853.653388][T10703] out_of_memory+0x620/0x880 [ 2853.657985][T10703] memory_max_write+0x31b/0x420 [ 2853.662843][T10703] ? memory_max_show+0x70/0x70 [ 2853.667767][T10703] cgroup_file_write+0x167/0x300 [ 2853.672754][T10703] ? __check_object_size+0x235/0x380 [ 2853.678103][T10703] ? cgroup_seqfile_stop+0x70/0x70 [ 2853.683220][T10703] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2853.688492][T10703] vfs_write+0x71c/0x890 [ 2853.692731][T10703] ksys_write+0xe8/0x1a0 [ 2853.696958][T10703] __x64_sys_write+0x3e/0x50 [ 2853.701570][T10703] do_syscall_64+0x2b/0x70 23:17:09 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_JOIN_OCB(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001"], 0x28}}, 0x0) 23:17:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002600)={0x0, 0x0, 0x0}, 0x8040) [ 2853.705992][T10703] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2853.711894][T10703] RIP: 0033:0x7fce18d590e9 [ 2853.716360][T10703] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2853.735967][T10703] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2853.744507][T10703] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2853.752486][T10703] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2853.760461][T10703] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2853.768439][T10703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2853.776407][T10703] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2853.784368][T10703] [ 2853.787471][T10703] memory: usage 928kB, limit 0kB, failcnt 13736 [ 2853.793709][T10703] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2853.800660][T10703] Memory cgroup stats for /syz0: [ 2853.804094][T10703] anon 36864 [ 2853.804094][T10703] file 118784 [ 2853.804094][T10703] kernel 139264 [ 2853.804094][T10703] kernel_stack 0 [ 2853.804094][T10703] pagetables 12288 [ 2853.804094][T10703] percpu 0 [ 2853.804094][T10703] sock 651264 [ 2853.804094][T10703] vmalloc 0 [ 2853.804094][T10703] shmem 118784 [ 2853.804094][T10703] file_mapped 118784 [ 2853.804094][T10703] file_dirty 0 [ 2853.804094][T10703] file_writeback 0 [ 2853.804094][T10703] swapcached 0 [ 2853.804094][T10703] inactive_anon 94208 [ 2853.804094][T10703] active_anon 61440 [ 2853.804094][T10703] inactive_file 0 [ 2853.804094][T10703] active_file 0 [ 2853.804094][T10703] unevictable 0 [ 2853.804094][T10703] slab_reclaimable 5808 [ 2853.804094][T10703] slab_unreclaimable 111280 [ 2853.804094][T10703] slab 117088 [ 2853.804094][T10703] workingset_refault_anon 0 [ 2853.804094][T10703] workingset_refault_file 48 [ 2853.804094][T10703] workingset_activate_anon 0 [ 2853.804094][T10703] workingset_activate_file 0 [ 2853.898276][T10703] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=10655,uid=0 [ 2853.913629][T10703] Memory cgroup out of memory: Killed process 10655 (syz-executor.0) total-vm:42336kB, anon-rss:364kB, file-rss:8192kB, shmem-rss:0kB, UID:0 pgtables:72kB oom_score_adj:0 [ 2853.934176][T10703] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2853.944485][T10703] CPU: 0 PID: 10703 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2853.955021][T10703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2853.965073][T10703] Call Trace: [ 2853.968439][T10703] [ 2853.971416][T10703] dump_stack_lvl+0xd6/0x122 [ 2853.976000][T10703] dump_stack+0x11/0x12 [ 2853.980223][T10703] dump_header+0x98/0x410 [ 2853.984540][T10703] out_of_memory+0x65e/0x880 [ 2853.989151][T10703] memory_max_write+0x31b/0x420 [ 2853.994054][T10703] ? memory_max_show+0x70/0x70 [ 2853.998923][T10703] cgroup_file_write+0x167/0x300 [ 2854.003856][T10703] ? __check_object_size+0x235/0x380 [ 2854.009149][T10703] ? cgroup_seqfile_stop+0x70/0x70 [ 2854.014321][T10703] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2854.019720][T10703] vfs_write+0x71c/0x890 [ 2854.024142][T10703] ksys_write+0xe8/0x1a0 [ 2854.025058][T10717] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2854.028388][T10703] __x64_sys_write+0x3e/0x50 [ 2854.042289][T10703] do_syscall_64+0x2b/0x70 [ 2854.046695][T10703] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2854.052575][T10703] RIP: 0033:0x7fce18d590e9 [ 2854.057045][T10703] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2854.076638][T10703] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2854.085103][T10703] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2854.093071][T10703] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2854.101035][T10703] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2854.109003][T10703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2854.117023][T10703] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2854.124996][T10703] [ 2854.128029][T10703] memory: usage 868kB, limit 0kB, failcnt 13753 [ 2854.134265][T10703] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2854.141122][T10703] Memory cgroup stats for /syz0: [ 2854.144023][T10703] anon 0 [ 2854.144023][T10703] file 118784 [ 2854.144023][T10703] kernel 118784 [ 2854.144023][T10703] kernel_stack 0 [ 2854.144023][T10703] pagetables 0 [ 2854.144023][T10703] percpu 0 [ 2854.144023][T10703] sock 651264 [ 2854.144023][T10703] vmalloc 0 [ 2854.144023][T10703] shmem 118784 [ 2854.144023][T10703] file_mapped 118784 [ 2854.144023][T10703] file_dirty 0 [ 2854.144023][T10703] file_writeback 0 [ 2854.144023][T10703] swapcached 0 [ 2854.144023][T10703] inactive_anon 57344 [ 2854.144023][T10703] active_anon 61440 [ 2854.144023][T10703] inactive_file 0 [ 2854.144023][T10703] active_file 0 [ 2854.144023][T10703] unevictable 0 23:17:10 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x7}}, 0x1c, 0x0}}], 0x1, 0x0) 23:17:10 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x18}}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg0\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={@private1, 0x0, r1}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) pipe2$watch_queue(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$inet6_dccp_int(r5, 0x21, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r4, 0x89fa, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000040)={'ip6gre0\x00', r6, 0x29, 0x40, 0x2, 0x5, 0x62, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x18}}, @dev={0xfe, 0x80, '\x00', 0xe}, 0x7, 0x20, 0x80000000, 0x5b7}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000300)={'ip6_vti0\x00', &(0x7f0000000280)={'ip6tnl0\x00', r6, 0x11f51dc67345669a, 0xf2, 0x9, 0x76, 0x33, @private1={0xfc, 0x1, '\x00', 0x1}, @private2, 0x20, 0x700, 0x2, 0x806}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r4, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', r6, 0x29, 0x4, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f00000004c0)={'syztnl1\x00', &(0x7f0000000440)={'ip6gre0\x00', r6, 0x29, 0x10, 0x20, 0xffffffff, 0x30, @remote, @mcast2, 0x40, 0x1, 0x9, 0x3ff}}) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f00000005c0)={'ip6tnl0\x00', &(0x7f0000000540)={'syztnl1\x00', r6, 0x29, 0x2c, 0x8, 0xff, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xd7, 0x48, 0x8, 0x48000000}}) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r5, &(0x7f00000010c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000000640)={0xa1c, 0x0, 0x8, 0x70bd25, 0x25dfdbfd, {}, [{{0x8, 0x1, r8}, {0x108, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8f}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r8}, {0x1ec, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xff}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x246b327b}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x81}}}]}}, {{0x8, 0x1, r8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r8}, {0x160, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x10001}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r8}, {0x1dc, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r12}}}]}}, {{0x8, 0x1, r8}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r8}, {0x1e8, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x100}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}]}}, {{0x8, 0x1, r13}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r6}}}]}}, {{0x8, 0x1, r14}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x40}}}]}}]}, 0xa1c}, 0x1, 0x0, 0x0, 0x8024}, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000580)={&(0x7f0000000140)={0x43c, 0x0, 0x1, 0x3, 0x25dfdbfe, {}, [{{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7f}}, {0x8, 0x6, r1}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x100000}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xd831}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r14}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3f2045fc}}}]}}, {{0x8}, {0x168, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xe44}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x200}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1000}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}]}, 0x43c}, 0x1, 0x0, 0x0, 0x8090}, 0x4) 23:17:10 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2854.144023][T10703] slab_reclaimable 3256 [ 2854.144023][T10703] slab_unreclaimable 111016 [ 2854.144023][T10703] slab 114272 [ 2854.144023][T10703] workingset_refault_anon 0 [ 2854.144023][T10703] workingset_refault_file 48 [ 2854.144023][T10703] workingset_activate_anon 0 [ 2854.144023][T10703] workingset_activate_file 0 [ 2854.237500][T10703] Out of memory and no killable processes... 23:17:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@union={0x4}]}, {0x0, [0x61, 0x0, 0x61, 0x5f, 0x0]}}, &(0x7f0000000180)=""/217, 0x2b, 0xd9, 0x1}, 0x20) 23:17:10 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:10 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_JOIN_OCB(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001"], 0x28}}, 0x0) 23:17:10 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000b80)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=[@hoplimit={{0x14}}, @tclass={{0x14}}], 0x30}}], 0x2, 0x48004) 23:17:10 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) sendmmsg$inet6(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0) [ 2854.340880][T10722] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:17:10 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:10 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000a40)={'sit0\x00', 0x0}) [ 2854.431693][T10732] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2854.468464][T10734] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2854.478841][T10734] CPU: 0 PID: 10734 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2854.489346][T10734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2854.499405][T10734] Call Trace: [ 2854.502680][T10734] [ 2854.505612][T10734] dump_stack_lvl+0xd6/0x122 [ 2854.510219][T10734] dump_stack+0x11/0x12 [ 2854.514398][T10734] dump_header+0x98/0x410 [ 2854.518741][T10734] out_of_memory+0x65e/0x880 [ 2854.523354][T10734] memory_max_write+0x31b/0x420 23:17:10 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x18}}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg0\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={@private1, 0x0, r1}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) pipe2$watch_queue(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$inet6_dccp_int(r5, 0x21, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r4, 0x89fa, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000040)={'ip6gre0\x00', r6, 0x29, 0x40, 0x2, 0x5, 0x62, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x18}}, @dev={0xfe, 0x80, '\x00', 0xe}, 0x7, 0x20, 0x80000000, 0x5b7}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000300)={'ip6_vti0\x00', &(0x7f0000000280)={'ip6tnl0\x00', r6, 0x11f51dc67345669a, 0xf2, 0x9, 0x76, 0x33, @private1={0xfc, 0x1, '\x00', 0x1}, @private2, 0x20, 0x700, 0x2, 0x806}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r4, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', r6, 0x29, 0x4, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f00000004c0)={'syztnl1\x00', &(0x7f0000000440)={'ip6gre0\x00', r6, 0x29, 0x10, 0x20, 0xffffffff, 0x30, @remote, @mcast2, 0x40, 0x1, 0x9, 0x3ff}}) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f00000005c0)={'ip6tnl0\x00', &(0x7f0000000540)={'syztnl1\x00', r6, 0x29, 0x2c, 0x8, 0xff, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xd7, 0x48, 0x8, 0x48000000}}) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r5, &(0x7f00000010c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000000640)={0xa1c, 0x0, 0x8, 0x70bd25, 0x25dfdbfd, {}, [{{0x8, 0x1, r8}, {0x108, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8f}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r8}, {0x1ec, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xff}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x246b327b}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x81}}}]}}, {{0x8, 0x1, r8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r8}, {0x160, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x10001}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r8}, {0x1dc, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r12}}}]}}, {{0x8, 0x1, r8}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r8}, {0x1e8, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x100}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}]}}, {{0x8, 0x1, r13}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r6}}}]}}, {{0x8, 0x1, r14}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x40}}}]}}]}, 0xa1c}, 0x1, 0x0, 0x0, 0x8024}, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000580)={&(0x7f0000000140)={0x43c, 0x0, 0x1, 0x3, 0x25dfdbfe, {}, [{{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7f}}, {0x8, 0x6, r1}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x100000}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xd831}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r14}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3f2045fc}}}]}}, {{0x8}, {0x168, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xe44}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x200}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1000}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}]}, 0x43c}, 0x1, 0x0, 0x0, 0x8090}, 0x4) [ 2854.528218][T10734] ? memory_max_show+0x70/0x70 [ 2854.533001][T10734] cgroup_file_write+0x167/0x300 [ 2854.537987][T10734] ? __check_object_size+0x235/0x380 [ 2854.543349][T10734] ? cgroup_seqfile_stop+0x70/0x70 [ 2854.548464][T10734] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2854.553753][T10734] vfs_write+0x71c/0x890 [ 2854.558043][T10734] ksys_write+0xe8/0x1a0 [ 2854.562298][T10734] __x64_sys_write+0x3e/0x50 [ 2854.566987][T10734] do_syscall_64+0x2b/0x70 [ 2854.571452][T10734] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2854.577349][T10734] RIP: 0033:0x7fce18d590e9 [ 2854.581783][T10734] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2854.601394][T10734] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2854.609806][T10734] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2854.617954][T10734] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2854.625927][T10734] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2854.633907][T10734] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2854.641880][T10734] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2854.649858][T10734] [ 2854.652977][T10734] memory: usage 864kB, limit 0kB, failcnt 13753 [ 2854.659299][T10734] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2854.666166][T10734] Memory cgroup stats for /syz0: [ 2854.672900][T10734] anon 0 [ 2854.672900][T10734] file 118784 [ 2854.672900][T10734] kernel 114688 [ 2854.672900][T10734] kernel_stack 0 [ 2854.672900][T10734] pagetables 0 [ 2854.672900][T10734] percpu 0 [ 2854.672900][T10734] sock 651264 [ 2854.672900][T10734] vmalloc 0 [ 2854.672900][T10734] shmem 118784 [ 2854.672900][T10734] file_mapped 118784 [ 2854.672900][T10734] file_dirty 0 [ 2854.672900][T10734] file_writeback 0 [ 2854.672900][T10734] swapcached 0 [ 2854.672900][T10734] inactive_anon 57344 [ 2854.672900][T10734] active_anon 61440 [ 2854.672900][T10734] inactive_file 0 23:17:10 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2854.672900][T10734] active_file 0 [ 2854.672900][T10734] unevictable 0 [ 2854.672900][T10734] slab_reclaimable 3256 [ 2854.672900][T10734] slab_unreclaimable 107736 [ 2854.672900][T10734] slab 110992 [ 2854.672900][T10734] workingset_refault_anon 0 [ 2854.672900][T10734] workingset_refault_file 48 [ 2854.672900][T10734] workingset_activate_anon 0 [ 2854.672900][T10734] workingset_activate_file 0 [ 2854.766593][T10734] Out of memory and no killable processes... 23:17:10 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001340)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0xa}}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0x3, 0x0, 0x0, @local}, 0x1c, 0x0}}], 0x2, 0x0) 23:17:10 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'erspan0\x00', 0x0}) 23:17:10 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x18}}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg0\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={@private1, 0x0, r1}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) pipe2$watch_queue(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$inet6_dccp_int(r5, 0x21, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r4, 0x89fa, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000040)={'ip6gre0\x00', r6, 0x29, 0x40, 0x2, 0x5, 0x62, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x18}}, @dev={0xfe, 0x80, '\x00', 0xe}, 0x7, 0x20, 0x80000000, 0x5b7}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000300)={'ip6_vti0\x00', &(0x7f0000000280)={'ip6tnl0\x00', r6, 0x11f51dc67345669a, 0xf2, 0x9, 0x76, 0x33, @private1={0xfc, 0x1, '\x00', 0x1}, @private2, 0x20, 0x700, 0x2, 0x806}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r4, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', r6, 0x29, 0x4, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f00000004c0)={'syztnl1\x00', &(0x7f0000000440)={'ip6gre0\x00', r6, 0x29, 0x10, 0x20, 0xffffffff, 0x30, @remote, @mcast2, 0x40, 0x1, 0x9, 0x3ff}}) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f00000005c0)={'ip6tnl0\x00', &(0x7f0000000540)={'syztnl1\x00', r6, 0x29, 0x2c, 0x8, 0xff, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xd7, 0x48, 0x8, 0x48000000}}) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r5, &(0x7f00000010c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000000640)={0xa1c, 0x0, 0x8, 0x70bd25, 0x25dfdbfd, {}, [{{0x8, 0x1, r8}, {0x108, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8f}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r8}, {0x1ec, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xff}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x246b327b}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x81}}}]}}, {{0x8, 0x1, r8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r8}, {0x160, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x10001}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r8}, {0x1dc, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r12}}}]}}, {{0x8, 0x1, r8}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r8}, {0x1e8, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x100}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}]}}, {{0x8, 0x1, r13}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r6}}}]}}, {{0x8, 0x1, r14}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x40}}}]}}]}, 0xa1c}, 0x1, 0x0, 0x0, 0x8024}, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000580)={&(0x7f0000000140)={0x43c, 0x0, 0x1, 0x3, 0x25dfdbfe, {}, [{{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7f}}, {0x8, 0x6, r1}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x100000}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xd831}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r14}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3f2045fc}}}]}}, {{0x8}, {0x168, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xe44}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x200}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1000}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}]}, 0x43c}, 0x1, 0x0, 0x0, 0x8090}, 0x4) 23:17:10 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:10 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$l2tp6(r0, &(0x7f00000001c0)="078e4b9432", 0x5, 0x0, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x3a}, 0x7}, 0x20) 23:17:10 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @private0, @rand_addr=' \x01\x00'}}) sendmmsg$inet6(r0, &(0x7f0000000000), 0x1, 0x0) [ 2854.940654][T10754] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2854.950880][T10754] CPU: 0 PID: 10754 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2854.961481][T10754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2854.971542][T10754] Call Trace: [ 2854.974876][T10754] [ 2854.977806][T10754] dump_stack_lvl+0xd6/0x122 [ 2854.982479][T10754] dump_stack+0x11/0x12 [ 2854.986716][T10754] dump_header+0x98/0x410 [ 2854.991103][T10754] out_of_memory+0x65e/0x880 [ 2854.995705][T10754] memory_max_write+0x31b/0x420 [ 2855.000575][T10754] ? memory_max_show+0x70/0x70 [ 2855.005362][T10754] cgroup_file_write+0x167/0x300 [ 2855.010334][T10754] ? __check_object_size+0x235/0x380 [ 2855.015640][T10754] ? cgroup_seqfile_stop+0x70/0x70 [ 2855.020758][T10754] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2855.026032][T10754] vfs_write+0x71c/0x890 [ 2855.030297][T10754] ksys_write+0xe8/0x1a0 [ 2855.034542][T10754] __x64_sys_write+0x3e/0x50 [ 2855.039141][T10754] do_syscall_64+0x2b/0x70 [ 2855.043574][T10754] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2855.049485][T10754] RIP: 0033:0x7fce18d590e9 [ 2855.053956][T10754] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2855.073795][T10754] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2855.082214][T10754] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2855.090187][T10754] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2855.098188][T10754] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2855.106171][T10754] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2855.114205][T10754] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2855.122275][T10754] [ 2855.125327][T10754] memory: usage 864kB, limit 0kB, failcnt 13753 [ 2855.131587][T10754] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2855.138454][T10754] Memory cgroup stats for /syz0: [ 2855.141814][T10754] anon 0 [ 2855.141814][T10754] file 118784 [ 2855.141814][T10754] kernel 114688 [ 2855.141814][T10754] kernel_stack 0 [ 2855.141814][T10754] pagetables 0 [ 2855.141814][T10754] percpu 0 [ 2855.141814][T10754] sock 651264 [ 2855.141814][T10754] vmalloc 0 [ 2855.141814][T10754] shmem 118784 [ 2855.141814][T10754] file_mapped 118784 [ 2855.141814][T10754] file_dirty 0 [ 2855.141814][T10754] file_writeback 0 [ 2855.141814][T10754] swapcached 0 [ 2855.141814][T10754] inactive_anon 57344 [ 2855.141814][T10754] active_anon 61440 [ 2855.141814][T10754] inactive_file 0 [ 2855.141814][T10754] active_file 0 [ 2855.141814][T10754] unevictable 0 [ 2855.141814][T10754] slab_reclaimable 3256 [ 2855.141814][T10754] slab_unreclaimable 107736 [ 2855.141814][T10754] slab 110992 [ 2855.141814][T10754] workingset_refault_anon 0 [ 2855.141814][T10754] workingset_refault_file 48 [ 2855.141814][T10754] workingset_activate_anon 0 [ 2855.141814][T10754] workingset_activate_file 0 [ 2855.235332][T10754] Out of memory and no killable processes... [ 2855.277472][T29609] device hsr_slave_0 left promiscuous mode [ 2855.283931][T29609] device hsr_slave_1 left promiscuous mode [ 2855.290499][T29609] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2855.298018][T29609] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2855.306066][T29609] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2855.313531][T29609] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2855.321366][T29609] device bridge_slave_1 left promiscuous mode [ 2855.327538][T29609] bridge0: port 2(bridge_slave_1) entered disabled state [ 2855.335497][T29609] device bridge_slave_0 left promiscuous mode [ 2855.341770][T29609] bridge0: port 1(bridge_slave_0) entered disabled state [ 2855.352051][T29609] device veth1_macvtap left promiscuous mode [ 2855.358131][T29609] device veth0_macvtap left promiscuous mode [ 2855.364170][T29609] device veth1_vlan left promiscuous mode [ 2855.369997][T29609] device veth0_vlan left promiscuous mode [ 2855.454353][T29609] team0 (unregistering): Port device team_slave_1 removed [ 2855.464160][T29609] team0 (unregistering): Port device team_slave_0 removed [ 2855.473861][T29609] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2855.487213][T29609] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2855.516382][T29609] bond0 (unregistering): Released all slaves [ 2856.204710][T10768] chnl_net:caif_netlink_parms(): no params data found [ 2856.234134][T10768] bridge0: port 1(bridge_slave_0) entered blocking state [ 2856.241225][T10768] bridge0: port 1(bridge_slave_0) entered disabled state [ 2856.248872][T10768] device bridge_slave_0 entered promiscuous mode [ 2856.257598][T10768] bridge0: port 2(bridge_slave_1) entered blocking state [ 2856.264747][T10768] bridge0: port 2(bridge_slave_1) entered disabled state [ 2856.272264][T10768] device bridge_slave_1 entered promiscuous mode [ 2856.288228][T10768] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2856.298444][T10768] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2856.316140][T10768] team0: Port device team_slave_0 added [ 2856.322369][T10768] team0: Port device team_slave_1 added [ 2856.336480][T10768] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2856.343690][T10768] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2856.369632][T10768] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2856.382233][T10768] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2856.389258][T10768] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2856.415217][T10768] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2856.437128][T10768] device hsr_slave_0 entered promiscuous mode [ 2856.443604][T10768] device hsr_slave_1 entered promiscuous mode [ 2856.449986][T10768] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2856.457539][T10768] Cannot create hsr debugfs directory [ 2856.485673][T10768] bridge0: port 2(bridge_slave_1) entered blocking state [ 2856.492721][T10768] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2856.499964][T10768] bridge0: port 1(bridge_slave_0) entered blocking state [ 2856.507020][T10768] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2856.533542][T10768] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2856.544011][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2856.552516][ T7472] bridge0: port 1(bridge_slave_0) entered disabled state [ 2856.560413][ T7472] bridge0: port 2(bridge_slave_1) entered disabled state [ 2856.573187][T10768] 8021q: adding VLAN 0 to HW filter on device team0 [ 2856.581754][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2856.590340][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2856.598750][ T9279] bridge0: port 1(bridge_slave_0) entered blocking state [ 2856.605790][ T9279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2856.616192][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2856.624732][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2856.633078][ T6136] bridge0: port 2(bridge_slave_1) entered blocking state [ 2856.640113][ T6136] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2856.655385][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2856.664217][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2856.673052][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2856.681554][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2856.690050][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2856.698299][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2856.707047][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2856.715197][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2856.723322][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2856.731618][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2856.740310][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2856.748869][T10768] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2856.761647][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2856.769240][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2856.778741][T10768] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2856.854291][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2856.863120][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2856.900861][T10768] device veth0_vlan entered promiscuous mode [ 2856.907942][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2856.916237][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2856.925183][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2856.932850][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2856.942697][T10768] device veth1_vlan entered promiscuous mode [ 2856.954431][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2856.962617][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2856.970445][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2856.978968][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2856.988564][T10768] device veth0_macvtap entered promiscuous mode [ 2856.997149][T10768] device veth1_macvtap entered promiscuous mode [ 2857.007777][T10768] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2857.018285][T10768] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2857.028184][T10768] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2857.038607][T10768] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2857.048436][T10768] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2857.058865][T10768] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2857.068777][T10768] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2857.079200][T10768] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2857.089019][T10768] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2857.099467][T10768] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2857.109416][T10768] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2857.119854][T10768] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2857.132304][T10768] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2857.140454][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2857.148634][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2857.156604][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2857.165041][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2857.174313][T10768] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2857.184747][T10768] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2857.194583][T10768] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2857.204999][T10768] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2857.214792][T10768] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2857.225235][T10768] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2857.235140][T10768] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2857.245563][T10768] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2857.255390][T10768] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2857.265812][T10768] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2857.275676][T10768] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2857.286093][T10768] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2857.297362][T10768] batman_adv: batadv0: Interface activated: batadv_slave_1 23:17:13 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x5452, 0x0) 23:17:13 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x18}}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg0\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={@private1, 0x0, r1}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) pipe2$watch_queue(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$inet6_dccp_int(r5, 0x21, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r4, 0x89fa, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000040)={'ip6gre0\x00', r6, 0x29, 0x40, 0x2, 0x5, 0x62, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x18}}, @dev={0xfe, 0x80, '\x00', 0xe}, 0x7, 0x20, 0x80000000, 0x5b7}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000300)={'ip6_vti0\x00', &(0x7f0000000280)={'ip6tnl0\x00', r6, 0x11f51dc67345669a, 0xf2, 0x9, 0x76, 0x33, @private1={0xfc, 0x1, '\x00', 0x1}, @private2, 0x20, 0x700, 0x2, 0x806}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r4, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', r6, 0x29, 0x4, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f00000004c0)={'syztnl1\x00', &(0x7f0000000440)={'ip6gre0\x00', r6, 0x29, 0x10, 0x20, 0xffffffff, 0x30, @remote, @mcast2, 0x40, 0x1, 0x9, 0x3ff}}) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f00000005c0)={'ip6tnl0\x00', &(0x7f0000000540)={'syztnl1\x00', r6, 0x29, 0x2c, 0x8, 0xff, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xd7, 0x48, 0x8, 0x48000000}}) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r5, &(0x7f00000010c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000000640)={0xa1c, 0x0, 0x8, 0x70bd25, 0x25dfdbfd, {}, [{{0x8, 0x1, r8}, {0x108, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8f}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r8}, {0x1ec, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xff}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x246b327b}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x81}}}]}}, {{0x8, 0x1, r8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r8}, {0x160, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x10001}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r8}, {0x1dc, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r12}}}]}}, {{0x8, 0x1, r8}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r8}, {0x1e8, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x100}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}]}}, {{0x8, 0x1, r13}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r6}}}]}}, {{0x8, 0x1, r14}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x40}}}]}}]}, 0xa1c}, 0x1, 0x0, 0x0, 0x8024}, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000580)={&(0x7f0000000140)={0x43c, 0x0, 0x1, 0x3, 0x25dfdbfe, {}, [{{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7f}}, {0x8, 0x6, r1}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x100000}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xd831}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r14}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3f2045fc}}}]}}, {{0x8}, {0x168, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xe44}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x200}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1000}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}]}, 0x43c}, 0x1, 0x0, 0x0, 0x8090}, 0x4) 23:17:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, &(0x7f0000000180)=""/217, 0x32, 0xd9, 0x1}, 0x20) 23:17:13 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x40049409, 0x0) 23:17:13 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:13 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2857.304797][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2857.313483][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 23:17:13 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x6c8, 0x528, 0x528, 0x528, 0x0, 0x1d8, 0x668, 0x668, 0x668, 0x668, 0x668, 0x6, 0x0, {[{{@ipv6={@dev, @remote, [], [], 'netdevsim0\x00', 'veth0_vlan\x00'}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@mcast1, @ipv4=@remote}}}, {{@ipv6={@private1, @dev, [], [], 'veth0_to_bond\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@remote}}}, {{@ipv6={@private0, @remote, [], [], 'veth0_to_bond\x00', 'vlan0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @private2, @private0, @dev, @empty, @mcast1, @loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback, @loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @dev, @private2, @private0, @local, @rand_addr=' \x01\x00']}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@local, @private0, [], [], 'hsr0\x00', 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @HL={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x728) 23:17:13 executing program 1: prlimit64(0x0, 0x7, &(0x7f00000002c0), 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 23:17:13 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x18}}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg0\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={@private1, 0x0, r1}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) pipe2$watch_queue(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$inet6_dccp_int(r4, 0x21, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r3, 0x89fa, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000040)={'ip6gre0\x00', r5, 0x29, 0x40, 0x2, 0x5, 0x62, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x18}}, @dev={0xfe, 0x80, '\x00', 0xe}, 0x7, 0x20, 0x80000000, 0x5b7}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000300)={'ip6_vti0\x00', &(0x7f0000000280)={'ip6tnl0\x00', r5, 0x11f51dc67345669a, 0xf2, 0x9, 0x76, 0x33, @private1={0xfc, 0x1, '\x00', 0x1}, @private2, 0x20, 0x700, 0x2, 0x806}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r3, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', r5, 0x29, 0x4, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f00000004c0)={'syztnl1\x00', &(0x7f0000000440)={'ip6gre0\x00', r5, 0x29, 0x10, 0x20, 0xffffffff, 0x30, @remote, @mcast2, 0x40, 0x1, 0x9, 0x3ff}}) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f00000005c0)={'ip6tnl0\x00', &(0x7f0000000540)={'syztnl1\x00', r5, 0x29, 0x2c, 0x8, 0xff, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xd7, 0x48, 0x8, 0x48000000}}) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r4, &(0x7f00000010c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001080)={&(0x7f0000000640)={0xa1c, 0x0, 0x8, 0x70bd25, 0x25dfdbfd, {}, [{{0x8, 0x1, r7}, {0x108, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8f}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r7}}}]}}, {{0x8, 0x1, r7}, {0x1ec, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xff}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x246b327b}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x81}}}]}}, {{0x8, 0x1, r7}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r7}, {0x160, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x10001}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r7}, {0x1dc, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r7}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r11}}}]}}, {{0x8, 0x1, r7}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r7}, {0x1e8, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r5}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x100}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}]}}, {{0x8, 0x1, r12}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r5}}}]}}, {{0x8, 0x1, r13}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x40}}}]}}]}, 0xa1c}, 0x1, 0x0, 0x0, 0x8024}, 0x0) 23:17:13 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x12) [ 2857.442061][T10814] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2857.452564][T10814] CPU: 0 PID: 10814 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2857.463063][T10814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2857.473108][T10814] Call Trace: [ 2857.476388][T10814] [ 2857.479321][T10814] dump_stack_lvl+0xd6/0x122 [ 2857.483919][T10814] dump_stack+0x11/0x12 [ 2857.488098][T10814] dump_header+0x98/0x410 23:17:13 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89a3, &(0x7f0000000680)={'ip6_vti0\x00', 0x0}) 23:17:13 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_JOIN_OCB(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0107000000000000000001"], 0x28}}, 0x0) [ 2857.492417][T10814] oom_kill_process+0xfe/0x550 [ 2857.497165][T10814] out_of_memory+0x620/0x880 [ 2857.501794][T10814] memory_max_write+0x31b/0x420 [ 2857.506654][T10814] ? memory_max_show+0x70/0x70 [ 2857.511415][T10814] cgroup_file_write+0x167/0x300 [ 2857.516419][T10814] ? cgroup_seqfile_stop+0x70/0x70 [ 2857.521540][T10814] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2857.526832][T10814] vfs_write+0x71c/0x890 [ 2857.531061][T10814] ksys_write+0xe8/0x1a0 [ 2857.535288][T10814] __x64_sys_write+0x3e/0x50 [ 2857.539881][T10814] do_syscall_64+0x2b/0x70 [ 2857.544351][T10814] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2857.550247][T10814] RIP: 0033:0x7fce18d590e9 [ 2857.554766][T10814] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2857.574374][T10814] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2857.582791][T10814] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2857.590854][T10814] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2857.598828][T10814] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2857.606863][T10814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2857.614972][T10814] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2857.622951][T10814] [ 2857.625682][T10828] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2857.626007][T10814] memory: usage 924kB, limit 0kB, failcnt 13772 [ 2857.626029][T10814] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2857.648629][T10814] Memory cgroup stats for /syz0: [ 2857.650058][T10814] anon 36864 [ 2857.650058][T10814] file 118784 [ 2857.650058][T10814] kernel 139264 [ 2857.650058][T10814] kernel_stack 0 [ 2857.650058][T10814] pagetables 8192 [ 2857.650058][T10814] percpu 0 [ 2857.650058][T10814] sock 651264 [ 2857.650058][T10814] vmalloc 0 [ 2857.650058][T10814] shmem 118784 [ 2857.650058][T10814] file_mapped 118784 [ 2857.650058][T10814] file_dirty 0 [ 2857.650058][T10814] file_writeback 0 [ 2857.650058][T10814] swapcached 0 [ 2857.650058][T10814] inactive_anon 94208 [ 2857.650058][T10814] active_anon 61440 [ 2857.650058][T10814] inactive_file 0 [ 2857.650058][T10814] active_file 0 [ 2857.650058][T10814] unevictable 0 [ 2857.650058][T10814] slab_reclaimable 7784 [ 2857.650058][T10814] slab_unreclaimable 111280 [ 2857.650058][T10814] slab 119064 [ 2857.650058][T10814] workingset_refault_anon 0 [ 2857.650058][T10814] workingset_refault_file 48 [ 2857.650058][T10814] workingset_activate_anon 0 [ 2857.650058][T10814] workingset_activate_file 0 [ 2857.744559][T10814] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=10768,uid=0 [ 2857.760049][T10814] Memory cgroup out of memory: Killed process 10768 (syz-executor.0) total-vm:42336kB, anon-rss:368kB, file-rss:8192kB, shmem-rss:0kB, UID:0 pgtables:72kB oom_score_adj:0 [ 2857.781837][T10814] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2857.792456][T10814] CPU: 1 PID: 10814 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2857.802943][T10814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2857.812981][T10814] Call Trace: [ 2857.816285][T10814] [ 2857.819200][T10814] dump_stack_lvl+0xd6/0x122 [ 2857.823774][T10814] dump_stack+0x11/0x12 [ 2857.827920][T10814] dump_header+0x98/0x410 [ 2857.832301][T10814] out_of_memory+0x65e/0x880 [ 2857.836890][T10814] memory_max_write+0x31b/0x420 [ 2857.841726][T10814] ? memory_max_show+0x70/0x70 [ 2857.846479][T10814] cgroup_file_write+0x167/0x300 [ 2857.851439][T10814] ? cgroup_seqfile_stop+0x70/0x70 [ 2857.856615][T10814] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2857.861911][T10814] vfs_write+0x71c/0x890 [ 2857.866199][T10814] ksys_write+0xe8/0x1a0 [ 2857.870496][T10814] __x64_sys_write+0x3e/0x50 [ 2857.875151][T10814] do_syscall_64+0x2b/0x70 [ 2857.879570][T10814] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2857.885442][T10814] RIP: 0033:0x7fce18d590e9 [ 2857.889915][T10814] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2857.909499][T10814] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2857.917948][T10814] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2857.925907][T10814] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2857.933860][T10814] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2857.941820][T10814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2857.949781][T10814] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2857.957788][T10814] [ 2857.960835][T10814] memory: usage 868kB, limit 0kB, failcnt 13789 [ 2857.967247][T10814] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2857.974144][T10814] Memory cgroup stats for /syz0: [ 2857.975239][T10814] anon 0 [ 2857.975239][T10814] file 118784 [ 2857.975239][T10814] kernel 118784 [ 2857.975239][T10814] kernel_stack 0 [ 2857.975239][T10814] pagetables 0 [ 2857.975239][T10814] percpu 0 [ 2857.975239][T10814] sock 651264 [ 2857.975239][T10814] vmalloc 0 [ 2857.975239][T10814] shmem 118784 [ 2857.975239][T10814] file_mapped 118784 [ 2857.975239][T10814] file_dirty 0 [ 2857.975239][T10814] file_writeback 0 [ 2857.975239][T10814] swapcached 0 [ 2857.975239][T10814] inactive_anon 57344 [ 2857.975239][T10814] active_anon 61440 [ 2857.975239][T10814] inactive_file 0 [ 2857.975239][T10814] active_file 0 [ 2857.975239][T10814] unevictable 0 [ 2857.975239][T10814] slab_reclaimable 3256 [ 2857.975239][T10814] slab_unreclaimable 111016 [ 2857.975239][T10814] slab 114272 [ 2857.975239][T10814] workingset_refault_anon 0 [ 2857.975239][T10814] workingset_refault_file 48 [ 2857.975239][T10814] workingset_activate_anon 0 [ 2857.975239][T10814] workingset_activate_file 0 [ 2858.069518][T10814] Out of memory and no killable processes... 23:17:13 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/power/sync_on_suspend', 0x82, 0x0) 23:17:13 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x18}}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg0\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={@private1, 0x0, r1}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) pipe2$watch_queue(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$inet6_dccp_int(r4, 0x21, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r3, 0x89fa, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000040)={'ip6gre0\x00', r5, 0x29, 0x40, 0x2, 0x5, 0x62, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x18}}, @dev={0xfe, 0x80, '\x00', 0xe}, 0x7, 0x20, 0x80000000, 0x5b7}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000300)={'ip6_vti0\x00', &(0x7f0000000280)={'ip6tnl0\x00', r5, 0x11f51dc67345669a, 0xf2, 0x9, 0x76, 0x33, @private1={0xfc, 0x1, '\x00', 0x1}, @private2, 0x20, 0x700, 0x2, 0x806}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r3, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', r5, 0x29, 0x4, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f00000004c0)={'syztnl1\x00', &(0x7f0000000440)={'ip6gre0\x00', r5, 0x29, 0x10, 0x20, 0xffffffff, 0x30, @remote, @mcast2, 0x40, 0x1, 0x9, 0x3ff}}) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f00000005c0)={'ip6tnl0\x00', &(0x7f0000000540)={'syztnl1\x00', r5, 0x29, 0x2c, 0x8, 0xff, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xd7, 0x48, 0x8, 0x48000000}}) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000600)) 23:17:13 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x8942, &(0x7f0000000680)={'ip6_vti0\x00', 0x0}) 23:17:13 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0xc0189436, 0x0) 23:17:13 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:13 executing program 0: socketpair(0x0, 0x69241eaabf5c27df, 0x0, 0x0) 23:17:14 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x12) 23:17:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x12, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:17:14 executing program 4: io_uring_setup(0x2f0d, &(0x7f0000000140)) 23:17:14 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x18}}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg0\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={@private1, 0x0, r1}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) pipe2$watch_queue(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$inet6_dccp_int(r4, 0x21, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r3, 0x89fa, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000040)={'ip6gre0\x00', r5, 0x29, 0x40, 0x2, 0x5, 0x62, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x18}}, @dev={0xfe, 0x80, '\x00', 0xe}, 0x7, 0x20, 0x80000000, 0x5b7}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000300)={'ip6_vti0\x00', &(0x7f0000000280)={'ip6tnl0\x00', r5, 0x11f51dc67345669a, 0xf2, 0x9, 0x76, 0x33, @private1={0xfc, 0x1, '\x00', 0x1}, @private2, 0x20, 0x700, 0x2, 0x806}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r3, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', r5, 0x29, 0x4, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f00000004c0)={'syztnl1\x00', &(0x7f0000000440)={'ip6gre0\x00', r5, 0x29, 0x10, 0x20, 0xffffffff, 0x30, @remote, @mcast2, 0x40, 0x1, 0x9, 0x3ff}}) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f00000005c0)={'ip6tnl0\x00', &(0x7f0000000540)={'syztnl1\x00', r5, 0x29, 0x2c, 0x8, 0xff, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xd7, 0x48, 0x8, 0x48000000}}) 23:17:14 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='R', 0x1, 0xffffffffffffffff) keyctl$read(0xb, r0, &(0x7f00000001c0)=""/215, 0xd7) 23:17:14 executing program 4: io_uring_setup(0x5bd5, &(0x7f0000000ac0)={0x0, 0x0, 0x2}) 23:17:14 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x12) [ 2858.398997][T10843] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2858.409546][T10843] CPU: 1 PID: 10843 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2858.420057][T10843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2858.430250][T10843] Call Trace: [ 2858.433535][T10843] [ 2858.436466][T10843] dump_stack_lvl+0xd6/0x122 [ 2858.441076][T10843] dump_stack+0x11/0x12 [ 2858.445237][T10843] dump_header+0x98/0x410 [ 2858.449573][T10843] out_of_memory+0x65e/0x880 [ 2858.454246][T10843] memory_max_write+0x31b/0x420 [ 2858.459158][T10843] ? memory_max_show+0x70/0x70 [ 2858.463935][T10843] cgroup_file_write+0x167/0x300 [ 2858.468885][T10843] ? __check_object_size+0x235/0x380 [ 2858.474240][T10843] ? cgroup_seqfile_stop+0x70/0x70 [ 2858.479367][T10843] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2858.484672][T10843] vfs_write+0x71c/0x890 [ 2858.488925][T10843] ksys_write+0xe8/0x1a0 [ 2858.493174][T10843] __x64_sys_write+0x3e/0x50 [ 2858.497845][T10843] do_syscall_64+0x2b/0x70 [ 2858.502317][T10843] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2858.508219][T10843] RIP: 0033:0x7fce18d590e9 [ 2858.512634][T10843] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2858.532354][T10843] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2858.540863][T10843] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2858.548983][T10843] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2858.556966][T10843] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2858.564989][T10843] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2858.572977][T10843] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2858.580956][T10843] [ 2858.584046][T10843] memory: usage 864kB, limit 0kB, failcnt 13789 [ 2858.590446][T10843] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2858.597358][T10843] Memory cgroup stats for /syz0: [ 2858.605929][T10843] anon 0 [ 2858.605929][T10843] file 118784 [ 2858.605929][T10843] kernel 114688 [ 2858.605929][T10843] kernel_stack 0 [ 2858.605929][T10843] pagetables 0 [ 2858.605929][T10843] percpu 0 [ 2858.605929][T10843] sock 651264 [ 2858.605929][T10843] vmalloc 0 [ 2858.605929][T10843] shmem 118784 [ 2858.605929][T10843] file_mapped 118784 [ 2858.605929][T10843] file_dirty 0 [ 2858.605929][T10843] file_writeback 0 [ 2858.605929][T10843] swapcached 0 23:17:14 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x18}}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg0\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={@private1, 0x0, r1}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) pipe2$watch_queue(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$inet6_dccp_int(r4, 0x21, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r3, 0x89fa, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000040)={'ip6gre0\x00', r5, 0x29, 0x40, 0x2, 0x5, 0x62, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x18}}, @dev={0xfe, 0x80, '\x00', 0xe}, 0x7, 0x20, 0x80000000, 0x5b7}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000300)={'ip6_vti0\x00', &(0x7f0000000280)={'ip6tnl0\x00', r5, 0x11f51dc67345669a, 0xf2, 0x9, 0x76, 0x33, @private1={0xfc, 0x1, '\x00', 0x1}, @private2, 0x20, 0x700, 0x2, 0x806}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r3, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', r5, 0x29, 0x4, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f00000004c0)={'syztnl1\x00', &(0x7f0000000440)={'ip6gre0\x00', r5, 0x29, 0x10, 0x20, 0xffffffff, 0x30, @remote, @mcast2, 0x40, 0x1, 0x9, 0x3ff}}) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)) [ 2858.605929][T10843] inactive_anon 57344 [ 2858.605929][T10843] active_anon 61440 [ 2858.605929][T10843] inactive_file 0 [ 2858.605929][T10843] active_file 0 [ 2858.605929][T10843] unevictable 0 [ 2858.605929][T10843] slab_reclaimable 3256 [ 2858.605929][T10843] slab_unreclaimable 107736 [ 2858.605929][T10843] slab 110992 [ 2858.605929][T10843] workingset_refault_anon 0 [ 2858.605929][T10843] workingset_refault_file 48 [ 2858.605929][T10843] workingset_activate_anon 0 [ 2858.605929][T10843] workingset_activate_file 0 [ 2858.699669][T10843] Out of memory and no killable processes... 23:17:14 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:14 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000004380)={'team0\x00', 0x0}) sendmmsg$inet6(r0, &(0x7f0000004980)=[{{&(0x7f0000000840)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0}}, {{&(0x7f0000003c00)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f00000043c0)=[@pktinfo={{0x24, 0x29, 0x32, {@dev={0xfe, 0x80, '\x00', 0x25}, r1}}}], 0x28}}], 0x2, 0x0) [ 2858.820554][ T5161] device hsr_slave_0 left promiscuous mode [ 2858.826981][ T5161] device hsr_slave_1 left promiscuous mode [ 2858.833710][ T5161] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2858.841220][ T5161] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2858.849009][ T5161] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2858.856615][ T5161] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2858.864287][ T5161] device bridge_slave_1 left promiscuous mode 23:17:14 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x801c581f, 0x0) [ 2858.870481][ T5161] bridge0: port 2(bridge_slave_1) entered disabled state [ 2858.880140][ T5161] device bridge_slave_0 left promiscuous mode [ 2858.886442][ T5161] bridge0: port 1(bridge_slave_0) entered disabled state [ 2858.898042][ T5161] device veth1_macvtap left promiscuous mode [ 2858.904030][ T5161] device veth0_macvtap left promiscuous mode [ 2858.910103][ T5161] device veth1_vlan left promiscuous mode [ 2858.915917][ T5161] device veth0_vlan left promiscuous mode [ 2859.010342][T10873] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2859.020714][T10873] CPU: 0 PID: 10873 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2859.031202][T10873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2859.041266][T10873] Call Trace: [ 2859.044535][T10873] [ 2859.047454][T10873] dump_stack_lvl+0xd6/0x122 [ 2859.052042][T10873] dump_stack+0x11/0x12 [ 2859.056264][T10873] dump_header+0x98/0x410 [ 2859.060645][T10873] out_of_memory+0x65e/0x880 [ 2859.065444][T10873] memory_max_write+0x31b/0x420 [ 2859.070361][T10873] ? memory_max_show+0x70/0x70 [ 2859.075138][T10873] cgroup_file_write+0x167/0x300 [ 2859.080114][T10873] ? __check_object_size+0x235/0x380 [ 2859.085485][T10873] ? cgroup_seqfile_stop+0x70/0x70 [ 2859.090594][T10873] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2859.095884][T10873] vfs_write+0x71c/0x890 [ 2859.100205][T10873] ksys_write+0xe8/0x1a0 [ 2859.104540][T10873] __x64_sys_write+0x3e/0x50 [ 2859.109113][T10873] do_syscall_64+0x2b/0x70 [ 2859.113584][T10873] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2859.119540][T10873] RIP: 0033:0x7fce18d590e9 [ 2859.123936][T10873] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2859.143587][T10873] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2859.152002][T10873] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2859.159971][T10873] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2859.167943][T10873] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2859.176022][T10873] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2859.183976][T10873] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2859.191944][T10873] [ 2859.195559][T10873] memory: usage 864kB, limit 0kB, failcnt 13789 [ 2859.201872][T10873] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2859.208752][T10873] Memory cgroup stats for /syz0: [ 2859.210108][T10873] anon 0 [ 2859.210108][T10873] file 118784 [ 2859.210108][T10873] kernel 114688 [ 2859.210108][T10873] kernel_stack 0 [ 2859.210108][T10873] pagetables 0 [ 2859.210108][T10873] percpu 0 [ 2859.210108][T10873] sock 651264 [ 2859.210108][T10873] vmalloc 0 [ 2859.210108][T10873] shmem 118784 [ 2859.210108][T10873] file_mapped 118784 [ 2859.210108][T10873] file_dirty 0 [ 2859.210108][T10873] file_writeback 0 [ 2859.210108][T10873] swapcached 0 [ 2859.210108][T10873] inactive_anon 57344 [ 2859.210108][T10873] active_anon 61440 [ 2859.210108][T10873] inactive_file 0 [ 2859.210108][T10873] active_file 0 [ 2859.210108][T10873] unevictable 0 [ 2859.210108][T10873] slab_reclaimable 3256 [ 2859.210108][T10873] slab_unreclaimable 107736 [ 2859.210108][T10873] slab 110992 [ 2859.210108][T10873] workingset_refault_anon 0 [ 2859.210108][T10873] workingset_refault_file 48 [ 2859.210108][T10873] workingset_activate_anon 0 [ 2859.210108][T10873] workingset_activate_file 0 [ 2859.304199][T10873] Out of memory and no killable processes... [ 2859.348003][ T5161] team0 (unregistering): Port device team_slave_1 removed [ 2859.358376][ T5161] team0 (unregistering): Port device team_slave_0 removed [ 2859.368559][ T5161] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2859.380299][ T5161] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2859.409820][ T5161] bond0 (unregistering): Released all slaves [ 2859.970050][T10885] chnl_net:caif_netlink_parms(): no params data found [ 2859.998951][T10885] bridge0: port 1(bridge_slave_0) entered blocking state [ 2860.006032][T10885] bridge0: port 1(bridge_slave_0) entered disabled state [ 2860.013668][T10885] device bridge_slave_0 entered promiscuous mode [ 2860.021040][T10885] bridge0: port 2(bridge_slave_1) entered blocking state [ 2860.028156][T10885] bridge0: port 2(bridge_slave_1) entered disabled state [ 2860.035884][T10885] device bridge_slave_1 entered promiscuous mode [ 2860.052342][T10885] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2860.062701][T10885] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2860.079960][T10885] team0: Port device team_slave_0 added [ 2860.086807][T10885] team0: Port device team_slave_1 added [ 2860.100511][T10885] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2860.107488][T10885] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2860.133579][T10885] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2860.144862][T10885] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2860.151828][T10885] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2860.177750][T10885] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2860.198715][T10885] device hsr_slave_0 entered promiscuous mode [ 2860.205364][T10885] device hsr_slave_1 entered promiscuous mode [ 2860.211769][T10885] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2860.219516][T10885] Cannot create hsr debugfs directory [ 2860.248201][T10885] bridge0: port 2(bridge_slave_1) entered blocking state [ 2860.255254][T10885] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2860.262532][T10885] bridge0: port 1(bridge_slave_0) entered blocking state [ 2860.269657][T10885] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2860.296379][T10885] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2860.308346][T10885] 8021q: adding VLAN 0 to HW filter on device team0 [ 2860.317767][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2860.325927][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2860.335141][T18607] bridge0: port 2(bridge_slave_1) entered disabled state [ 2860.355877][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2860.364240][T18607] bridge0: port 2(bridge_slave_1) entered blocking state [ 2860.371331][T18607] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2860.379851][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2860.388607][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2860.399010][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2860.406837][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2860.418420][T10885] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2860.429297][T10885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2860.438406][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2860.451159][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2860.459669][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2860.469058][T10885] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2860.546408][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2860.586351][ T3951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2860.594590][ T3951] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2860.602372][ T3951] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2860.611397][T10885] device veth0_vlan entered promiscuous mode [ 2860.620250][T10885] device veth1_vlan entered promiscuous mode [ 2860.633618][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2860.641760][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2860.649992][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2860.660258][T10885] device veth0_macvtap entered promiscuous mode [ 2860.668153][T10885] device veth1_macvtap entered promiscuous mode [ 2860.679274][T10885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2860.689780][T10885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2860.699630][T10885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2860.710044][T10885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2860.719936][T10885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2860.730350][T10885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2860.740375][T10885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2860.750788][T10885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2860.760595][T10885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2860.771075][T10885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2860.780901][T10885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2860.791307][T10885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2860.802608][T10885] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2860.810939][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2860.821838][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2860.831218][T10885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2860.841735][T10885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2860.851553][T10885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2860.862089][T10885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2860.872192][T10885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2860.882604][T10885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2860.892453][T10885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2860.902932][T10885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2860.912739][T10885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2860.923154][T10885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2860.932985][T10885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 23:17:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_SCHED_SCAN(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000180)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_SCAN_SSIDS={0x8, 0x2d, 0x0, 0x1, [{0x4}]}]}, 0x1c}}, 0x0) 23:17:16 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, 0x0, 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:16 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x8992, &(0x7f0000000680)={'ip6_vti0\x00', 0x0}) 23:17:16 executing program 4: socketpair(0x23, 0x0, 0x3f3, &(0x7f0000000000)) 23:17:16 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:16 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x18}}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg0\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={@private1, 0x0, r1}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) pipe2$watch_queue(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$inet6_dccp_int(r4, 0x21, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r3, 0x89fa, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000040)={'ip6gre0\x00', r5, 0x29, 0x40, 0x2, 0x5, 0x62, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x18}}, @dev={0xfe, 0x80, '\x00', 0xe}, 0x7, 0x20, 0x80000000, 0x5b7}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000300)={'ip6_vti0\x00', &(0x7f0000000280)={'ip6tnl0\x00', r5, 0x11f51dc67345669a, 0xf2, 0x9, 0x76, 0x33, @private1={0xfc, 0x1, '\x00', 0x1}, @private2, 0x20, 0x700, 0x2, 0x806}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r3, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', r5, 0x29, 0x4, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f00000004c0)={'syztnl1\x00', &(0x7f0000000440)={'ip6gre0\x00', r5, 0x29, 0x10, 0x20, 0xffffffff, 0x30, @remote, @mcast2, 0x40, 0x1, 0x9, 0x3ff}}) [ 2860.943430][T10885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2860.954384][T10885] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2860.963582][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2860.972449][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 23:17:16 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x8930, &(0x7f0000000680)={'ip6_vti0\x00', 0x0}) 23:17:16 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_JOIN_OCB(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="1fffffff00000000000001"], 0x28}}, 0x0) 23:17:16 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x18}}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg0\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={@private1, 0x0, r1}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) pipe2$watch_queue(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$inet6_dccp_int(r4, 0x21, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r3, 0x89fa, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000040)={'ip6gre0\x00', r5, 0x29, 0x40, 0x2, 0x5, 0x62, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x18}}, @dev={0xfe, 0x80, '\x00', 0xe}, 0x7, 0x20, 0x80000000, 0x5b7}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000300)={'ip6_vti0\x00', &(0x7f0000000280)={'ip6tnl0\x00', r5, 0x11f51dc67345669a, 0xf2, 0x9, 0x76, 0x33, @private1={0xfc, 0x1, '\x00', 0x1}, @private2, 0x20, 0x700, 0x2, 0x806}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r3, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', r5, 0x29, 0x4, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) [ 2861.096158][T10885] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2861.106185][T10885] CPU: 1 PID: 10885 Comm: syz-executor.0 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2861.116690][T10885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2861.126729][T10885] Call Trace: [ 2861.130006][T10885] [ 2861.132925][T10885] dump_stack_lvl+0xd6/0x122 [ 2861.137513][T10885] dump_stack+0x11/0x12 [ 2861.141773][T10885] dump_header+0x98/0x410 [ 2861.146194][T10885] oom_kill_process+0xfe/0x550 [ 2861.151032][T10885] out_of_memory+0x620/0x880 [ 2861.155668][T10885] mem_cgroup_oom+0x475/0x4f0 [ 2861.160330][T10885] try_charge_memcg+0x746/0x960 [ 2861.165171][T10885] ? try_to_unlazy+0x3c9/0x540 [ 2861.169971][T10885] obj_cgroup_charge+0x171/0x2b0 [ 2861.174989][T10885] memcg_slab_pre_alloc_hook+0xf7/0x170 [ 2861.180627][T10885] ? __d_alloc+0x3d/0x380 [ 2861.184972][T10885] kmem_cache_alloc_lru+0x76/0x2b0 [ 2861.190076][T10885] ? __d_lookup+0x3a6/0x3d0 [ 2861.194559][T10885] __d_alloc+0x3d/0x380 [ 2861.198771][T10885] d_alloc+0x2a/0x100 [ 2861.202936][T10885] __lookup_hash+0x8f/0x180 [ 2861.207432][T10885] filename_create+0x147/0x2b0 [ 2861.212252][T10885] do_mkdirat+0x63/0x280 [ 2861.216483][T10885] __x64_sys_mkdirat+0x4c/0x60 [ 2861.221243][T10885] do_syscall_64+0x2b/0x70 [ 2861.225649][T10885] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2861.231573][T10885] RIP: 0033:0x7f1ab2a231f7 [ 2861.235969][T10885] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2861.255712][T10885] RSP: 002b:00007ffcf72d72f8 EFLAGS: 00000202 ORIG_RAX: 0000000000000102 [ 2861.264102][T10885] RAX: ffffffffffffffda RBX: 00007ffcf72d7380 RCX: 00007f1ab2a231f7 [ 2861.272052][T10885] RDX: 00000000000001ff RSI: 00007ffcf72d7380 RDI: 00000000ffffff9c [ 2861.280004][T10885] RBP: 00007ffcf72d735c R08: 0000000000000000 R09: 0000000000000003 [ 2861.287955][T10885] R10: 00007ffcf72d7097 R11: 0000000000000202 R12: 0000000000000032 23:17:17 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, 0x0, 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2861.295908][T10885] R13: 00000000002ba7cc R14: 0000000000000001 R15: 00007ffcf72d73c0 [ 2861.303861][T10885] [ 2861.306970][T10885] memory: usage 920kB, limit 0kB, failcnt 13808 [ 2861.313186][T10885] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2861.320032][T10885] Memory cgroup stats for /syz0: [ 2861.320398][T10885] anon 36864 [ 2861.320398][T10885] file 118784 [ 2861.320398][T10885] kernel 135168 [ 2861.320398][T10885] kernel_stack 0 [ 2861.320398][T10885] pagetables 8192 [ 2861.320398][T10885] percpu 0 [ 2861.320398][T10885] sock 651264 [ 2861.320398][T10885] vmalloc 0 [ 2861.320398][T10885] shmem 118784 [ 2861.320398][T10885] file_mapped 118784 [ 2861.320398][T10885] file_dirty 0 [ 2861.320398][T10885] file_writeback 0 [ 2861.320398][T10885] swapcached 0 [ 2861.320398][T10885] inactive_anon 94208 [ 2861.320398][T10885] active_anon 61440 [ 2861.320398][T10885] inactive_file 0 [ 2861.320398][T10885] active_file 0 [ 2861.320398][T10885] unevictable 0 [ 2861.320398][T10885] slab_reclaimable 6984 [ 2861.320398][T10885] slab_unreclaimable 111280 [ 2861.320398][T10885] slab 118264 [ 2861.320398][T10885] workingset_refault_anon 0 [ 2861.320398][T10885] workingset_refault_file 48 [ 2861.320398][T10885] workingset_activate_anon 0 [ 2861.320398][T10885] workingset_activate_file 0 [ 2861.414536][T10885] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=10885,uid=0 [ 2861.429963][T10885] Memory cgroup out of memory: Killed process 10885 (syz-executor.0) total-vm:42336kB, anon-rss:360kB, file-rss:8192kB, shmem-rss:0kB, UID:0 pgtables:72kB oom_score_adj:0 [ 2861.457913][T10931] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2861.468296][T10931] CPU: 0 PID: 10931 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2861.479223][T10931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2861.489276][T10931] Call Trace: [ 2861.492562][T10931] [ 2861.495474][T10931] dump_stack_lvl+0xd6/0x122 [ 2861.500093][T10931] dump_stack+0x11/0x12 23:17:17 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockname$l2tp6(r0, 0x0, 0x0) 23:17:17 executing program 1: socketpair(0x15, 0x0, 0x0, &(0x7f00000001c0)) [ 2861.504253][T10931] dump_header+0x98/0x410 [ 2861.508591][T10931] out_of_memory+0x65e/0x880 [ 2861.508773][T10938] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2861.513185][T10931] memory_max_write+0x31b/0x420 [ 2861.513219][T10931] ? memory_max_show+0x70/0x70 [ 2861.532080][T10931] cgroup_file_write+0x167/0x300 [ 2861.537043][T10931] ? __check_object_size+0x235/0x380 [ 2861.542341][T10931] ? cgroup_seqfile_stop+0x70/0x70 [ 2861.547467][T10931] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2861.552795][T10931] vfs_write+0x71c/0x890 [ 2861.557090][T10931] ksys_write+0xe8/0x1a0 [ 2861.561369][T10931] __x64_sys_write+0x3e/0x50 [ 2861.565961][T10931] do_syscall_64+0x2b/0x70 [ 2861.570363][T10931] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2861.576377][T10931] RIP: 0033:0x7fce18d590e9 [ 2861.580873][T10931] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2861.600563][T10931] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2861.608985][T10931] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2861.616964][T10931] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2861.625010][T10931] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2861.632981][T10931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2861.640961][T10931] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2861.648949][T10931] [ 2861.652272][T10931] memory: usage 868kB, limit 0kB, failcnt 13825 [ 2861.658612][T10931] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2861.665543][T10931] Memory cgroup stats for /syz0: [ 2861.667458][T10931] anon 0 [ 2861.667458][T10931] file 118784 [ 2861.667458][T10931] kernel 118784 [ 2861.667458][T10931] kernel_stack 0 [ 2861.667458][T10931] pagetables 0 [ 2861.667458][T10931] percpu 0 [ 2861.667458][T10931] sock 651264 [ 2861.667458][T10931] vmalloc 0 [ 2861.667458][T10931] shmem 118784 [ 2861.667458][T10931] file_mapped 118784 [ 2861.667458][T10931] file_dirty 0 [ 2861.667458][T10931] file_writeback 0 [ 2861.667458][T10931] swapcached 0 [ 2861.667458][T10931] inactive_anon 57344 [ 2861.667458][T10931] active_anon 61440 [ 2861.667458][T10931] inactive_file 0 [ 2861.667458][T10931] active_file 0 [ 2861.667458][T10931] unevictable 0 [ 2861.667458][T10931] slab_reclaimable 3256 [ 2861.667458][T10931] slab_unreclaimable 111016 [ 2861.667458][T10931] slab 114272 [ 2861.667458][T10931] workingset_refault_anon 0 [ 2861.667458][T10931] workingset_refault_file 48 [ 2861.667458][T10931] workingset_activate_anon 0 23:17:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)={{0x14}, [@NFT_MSG_DELRULE={0x20, 0x8, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELRULE={0x14, 0x8, 0xa, 0x201}], {0x14}}, 0x5c}}, 0x0) 23:17:17 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x18}}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg0\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={@private1, 0x0, r1}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) pipe2$watch_queue(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$inet6_dccp_int(r4, 0x21, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r3, 0x89fa, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000040)={'ip6gre0\x00', r5, 0x29, 0x40, 0x2, 0x5, 0x62, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x18}}, @dev={0xfe, 0x80, '\x00', 0xe}, 0x7, 0x20, 0x80000000, 0x5b7}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r3, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', r5, 0x29, 0x4, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) 23:17:17 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, 0x0, 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)={{0x14}, [@NFT_MSG_DELRULE={0x20, 0x8, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x48}}, 0x0) 23:17:17 executing program 1: syz_emit_ethernet(0x1366, &(0x7f00000027c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd6aa8b8e813302c002001000000000000000000000000000100000000000000000000000000000001790004"], 0x0) 23:17:17 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2861.667458][T10931] workingset_activate_file 0 [ 2861.761423][T10931] Out of memory and no killable processes... 23:17:17 executing program 0: sendto$l2tp6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 23:17:17 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000001500)=ANY=[@ANYBLOB="c40500", @ANYRES16, @ANYBLOB="20002cbd"], 0x5c4}}, 0x0) sendmmsg$inet6(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @dev}, 0x1c, 0x0}}], 0x35a, 0x0) 23:17:17 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x8921, &(0x7f0000000680)={'ip6_vti0\x00', 0x0}) 23:17:17 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x18}}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg0\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={@private1, 0x0, r1}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) pipe2$watch_queue(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$inet6_dccp_int(r4, 0x21, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r3, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', r5, 0x29, 0x4, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) 23:17:17 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x12) [ 2861.976449][T10964] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2861.986947][T10964] CPU: 1 PID: 10964 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2861.997458][T10964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2862.007523][T10964] Call Trace: [ 2862.010833][T10964] [ 2862.013768][T10964] dump_stack_lvl+0xd6/0x122 [ 2862.018430][T10964] dump_stack+0x11/0x12 [ 2862.022635][T10964] dump_header+0x98/0x410 [ 2862.026973][T10964] out_of_memory+0x65e/0x880 [ 2862.031579][T10964] memory_max_write+0x31b/0x420 [ 2862.036475][T10964] ? memory_max_show+0x70/0x70 [ 2862.041266][T10964] cgroup_file_write+0x167/0x300 [ 2862.046215][T10964] ? __check_object_size+0x235/0x380 [ 2862.051570][T10964] ? cgroup_seqfile_stop+0x70/0x70 [ 2862.056689][T10964] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2862.062038][T10964] vfs_write+0x71c/0x890 [ 2862.066290][T10964] ksys_write+0xe8/0x1a0 [ 2862.070935][T10964] __x64_sys_write+0x3e/0x50 23:17:17 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$PPPIOCGFLAGS1(r0, 0x8004745a, 0x0) 23:17:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000340)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x54, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8}]}, 0x9d}}, 0x0) [ 2862.075673][T10964] do_syscall_64+0x2b/0x70 [ 2862.080100][T10964] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2862.086012][T10964] RIP: 0033:0x7fce18d590e9 [ 2862.090432][T10964] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2862.110123][T10964] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2862.118722][T10964] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2862.126702][T10964] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2862.134709][T10964] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2862.142691][T10964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2862.150666][T10964] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2862.158645][T10964] [ 2862.162054][T10964] memory: usage 864kB, limit 0kB, failcnt 13825 [ 2862.168422][T10964] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2862.175372][T10964] Memory cgroup stats for /syz0: [ 2862.178413][T10964] anon 0 [ 2862.178413][T10964] file 118784 [ 2862.178413][T10964] kernel 114688 [ 2862.178413][T10964] kernel_stack 0 [ 2862.178413][T10964] pagetables 0 [ 2862.178413][T10964] percpu 0 [ 2862.178413][T10964] sock 651264 [ 2862.178413][T10964] vmalloc 0 [ 2862.178413][T10964] shmem 118784 [ 2862.178413][T10964] file_mapped 118784 [ 2862.178413][T10964] file_dirty 0 [ 2862.178413][T10964] file_writeback 0 [ 2862.178413][T10964] swapcached 0 23:17:18 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2862.178413][T10964] inactive_anon 57344 [ 2862.178413][T10964] active_anon 61440 [ 2862.178413][T10964] inactive_file 0 [ 2862.178413][T10964] active_file 0 [ 2862.178413][T10964] unevictable 0 [ 2862.178413][T10964] slab_reclaimable 3256 [ 2862.178413][T10964] slab_unreclaimable 107736 [ 2862.178413][T10964] slab 110992 [ 2862.178413][T10964] workingset_refault_anon 0 [ 2862.178413][T10964] workingset_refault_file 48 [ 2862.178413][T10964] workingset_activate_anon 0 [ 2862.178413][T10964] workingset_activate_file 0 [ 2862.272463][T10964] Out of memory and no killable processes... 23:17:18 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x18}}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg0\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={@private1, 0x0, r1}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) pipe2$watch_queue(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$inet6_dccp_int(r4, 0x21, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r3, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', r5, 0x29, 0x4, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) 23:17:18 executing program 4: syz_emit_ethernet(0x2e, &(0x7f0000000140)={@random="dbaa7da10a9f", @local, @void, {@ipv4={0x800, @udp={{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, @private=0xa010101, @remote, {[@lsrr={0x83, 0x3}]}}, {0x0, 0x0, 0x8}}}}}, 0x0) 23:17:18 executing program 1: r0 = syz_io_uring_setup(0x3f02, &(0x7f0000000080), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f00000001c0), 0x1) 23:17:18 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x12) [ 2862.517409][T20545] device hsr_slave_0 left promiscuous mode [ 2862.524388][T20545] device hsr_slave_1 left promiscuous mode [ 2862.533242][T20545] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2862.538733][T10984] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2862.540822][T20545] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2862.551126][T10984] CPU: 0 PID: 10984 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2862.568568][T10984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2862.578724][T10984] Call Trace: [ 2862.582110][T10984] [ 2862.585045][T10984] dump_stack_lvl+0xd6/0x122 [ 2862.589676][T10984] dump_stack+0x11/0x12 [ 2862.593861][T10984] dump_header+0x98/0x410 [ 2862.598177][T10984] out_of_memory+0x65e/0x880 [ 2862.602843][T10984] memory_max_write+0x31b/0x420 [ 2862.607727][T10984] ? memory_max_show+0x70/0x70 [ 2862.612584][T10984] cgroup_file_write+0x167/0x300 [ 2862.617512][T10984] ? __check_object_size+0x235/0x380 [ 2862.622806][T10984] ? cgroup_seqfile_stop+0x70/0x70 [ 2862.628010][T10984] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2862.633302][T10984] vfs_write+0x71c/0x890 [ 2862.637588][T10984] ksys_write+0xe8/0x1a0 [ 2862.641820][T10984] __x64_sys_write+0x3e/0x50 [ 2862.646406][T10984] do_syscall_64+0x2b/0x70 [ 2862.650900][T10984] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2862.656846][T10984] RIP: 0033:0x7fce18d590e9 [ 2862.661264][T10984] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2862.681315][T10984] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2862.689807][T10984] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2862.697766][T10984] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2862.705745][T10984] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2862.713726][T10984] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2862.721761][T10984] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2862.729838][T10984] [ 2862.733201][T10984] memory: usage 864kB, limit 0kB, failcnt 13825 [ 2862.733631][T20545] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2862.739573][T10984] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2862.746994][T20545] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2862.761033][T10984] Memory cgroup stats for /syz0: [ 2862.761914][T10984] anon 0 [ 2862.761914][T10984] file 118784 [ 2862.761914][T10984] kernel 114688 [ 2862.761914][T10984] kernel_stack 0 [ 2862.761914][T10984] pagetables 0 [ 2862.761914][T10984] percpu 0 [ 2862.761914][T10984] sock 651264 [ 2862.761914][T10984] vmalloc 0 [ 2862.761914][T10984] shmem 118784 [ 2862.761914][T10984] file_mapped 118784 [ 2862.761914][T10984] file_dirty 0 [ 2862.761914][T10984] file_writeback 0 [ 2862.761914][T10984] swapcached 0 [ 2862.761914][T10984] inactive_anon 57344 [ 2862.761914][T10984] active_anon 61440 [ 2862.761914][T10984] inactive_file 0 [ 2862.761914][T10984] active_file 0 [ 2862.761914][T10984] unevictable 0 [ 2862.761914][T10984] slab_reclaimable 3256 [ 2862.761914][T10984] slab_unreclaimable 107736 [ 2862.761914][T10984] slab 110992 [ 2862.761914][T10984] workingset_refault_anon 0 [ 2862.761914][T10984] workingset_refault_file 48 [ 2862.761914][T10984] workingset_activate_anon 0 [ 2862.761914][T10984] workingset_activate_file 0 [ 2862.856357][T10984] Out of memory and no killable processes... [ 2862.864839][T20545] device bridge_slave_1 left promiscuous mode [ 2862.871149][T20545] bridge0: port 2(bridge_slave_1) entered disabled state [ 2862.879009][T20545] device bridge_slave_0 left promiscuous mode [ 2862.885238][T20545] bridge0: port 1(bridge_slave_0) entered disabled state [ 2862.896612][T20545] device veth1_macvtap left promiscuous mode [ 2862.902595][T20545] device veth0_macvtap left promiscuous mode [ 2862.908709][T20545] device veth1_vlan left promiscuous mode [ 2862.914458][T20545] device veth0_vlan left promiscuous mode [ 2863.010844][T20545] team0 (unregistering): Port device team_slave_1 removed [ 2863.020724][T20545] team0 (unregistering): Port device team_slave_0 removed [ 2863.032690][T20545] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2863.046531][T20545] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2863.084833][T20545] bond0 (unregistering): Released all slaves [ 2863.625883][T10994] chnl_net:caif_netlink_parms(): no params data found [ 2863.655029][T10994] bridge0: port 1(bridge_slave_0) entered blocking state [ 2863.662073][T10994] bridge0: port 1(bridge_slave_0) entered disabled state [ 2863.670159][T10994] device bridge_slave_0 entered promiscuous mode [ 2863.678683][T10994] bridge0: port 2(bridge_slave_1) entered blocking state [ 2863.685740][T10994] bridge0: port 2(bridge_slave_1) entered disabled state [ 2863.693431][T10994] device bridge_slave_1 entered promiscuous mode [ 2863.709629][T10994] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2863.719930][T10994] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2863.737506][T10994] team0: Port device team_slave_0 added [ 2863.744017][T10994] team0: Port device team_slave_1 added [ 2863.758023][T10994] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2863.765010][T10994] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2863.790903][T10994] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2863.803312][T10994] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2863.810337][T10994] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2863.836209][T10994] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2863.857569][T10994] device hsr_slave_0 entered promiscuous mode [ 2863.864253][T10994] device hsr_slave_1 entered promiscuous mode [ 2863.871912][T10994] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2863.879586][T10994] Cannot create hsr debugfs directory [ 2863.907186][T10994] bridge0: port 2(bridge_slave_1) entered blocking state [ 2863.914251][T10994] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2863.921661][T10994] bridge0: port 1(bridge_slave_0) entered blocking state [ 2863.928682][T10994] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2863.953983][T10994] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2863.964223][ T3951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2863.972957][ T3951] bridge0: port 1(bridge_slave_0) entered disabled state [ 2863.981111][ T3951] bridge0: port 2(bridge_slave_1) entered disabled state [ 2863.992247][T10994] 8021q: adding VLAN 0 to HW filter on device team0 [ 2864.002201][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2864.010484][T18607] bridge0: port 1(bridge_slave_0) entered blocking state [ 2864.017510][T18607] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2864.028270][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2864.036640][T10079] bridge0: port 2(bridge_slave_1) entered blocking state [ 2864.043652][T10079] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2864.058487][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2864.067050][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2864.077972][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2864.090401][T10994] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2864.100855][T10994] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2864.115040][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2864.123539][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2864.132249][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2864.142160][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2864.151586][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2864.161346][T10994] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2864.237519][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2864.247800][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2864.285536][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2864.293597][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2864.302728][T10994] device veth0_vlan entered promiscuous mode [ 2864.310225][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2864.317977][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2864.327976][T10994] device veth1_vlan entered promiscuous mode [ 2864.340084][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2864.347932][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2864.356082][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2864.364287][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2864.374454][T10994] device veth0_macvtap entered promiscuous mode [ 2864.382147][T10994] device veth1_macvtap entered promiscuous mode [ 2864.392680][T10994] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2864.403175][T10994] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2864.413029][T10994] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2864.423447][T10994] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2864.433250][T10994] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2864.443661][T10994] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2864.453518][T10994] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2864.463929][T10994] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2864.473729][T10994] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2864.484242][T10994] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2864.494072][T10994] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2864.504555][T10994] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2864.515993][T10994] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2864.523747][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2864.531771][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2864.541345][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2864.549840][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2864.560482][T10994] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2864.570894][T10994] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2864.580722][T10994] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2864.591152][T10994] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2864.600952][T10994] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2864.611364][T10994] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2864.621191][T10994] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2864.631603][T10994] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2864.641407][T10994] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2864.651812][T10994] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2864.661690][T10994] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2864.672095][T10994] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2864.683008][T10994] batman_adv: batadv0: Interface activated: batadv_slave_1 23:17:20 executing program 0: socketpair(0x18, 0x0, 0x0, &(0x7f0000000080)) 23:17:20 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x18}}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg0\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={@private1, 0x0, r1}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) pipe2$watch_queue(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$inet6_dccp_int(r4, 0x21, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r3, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x4, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) 23:17:20 executing program 4: syz_emit_ethernet(0x87, &(0x7f0000000000)={@multicast, @broadcast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x79, 0x0, 0x0, 0x0, 0x6, 0x0, @empty}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0xc2, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "3ad785008a00"}, @sack={0x5, 0x6, [0x0]}, @exp_fastopen={0xfe, 0xa, 0xf989, "e85518913545"}, @mss={0x2, 0x4}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x6, 0xf989, "1fee"}, @window={0x3, 0x3}, @fastopen={0x22, 0xc, "d41d8ac650f34cb77fbd"}]}}, {"c791735457bd80017501fd08097cda1ba0"}}}}}}, 0x0) 23:17:20 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000008cc0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000008d00)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 23:17:20 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:20 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x12) [ 2864.691056][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2864.700008][T18607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 23:17:20 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f00000020c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "4fd1aa6c4c34eb501eb06f5c8956e98132d323db60d2c248bc8bd1f44a0fbea2b52809387be67f32dced9ff26c829a363affc2d8613eda0d13382865e7f80d", 0x19}, 0x60) 23:17:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x19, 0x0, 0x0, 0x1010000, 0x0, 0x1}, 0x48) 23:17:20 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x18}}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg0\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={@private1, 0x0, r1}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) pipe2$watch_queue(&(0x7f0000000340), 0x80) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r3, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x4, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) [ 2864.797074][T11040] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2864.807352][T11040] CPU: 1 PID: 11040 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2864.817838][T11040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2864.827876][T11040] Call Trace: [ 2864.831137][T11040] [ 2864.834061][T11040] dump_stack_lvl+0xd6/0x122 [ 2864.838637][T11040] dump_stack+0x11/0x12 [ 2864.842885][T11040] dump_header+0x98/0x410 [ 2864.847265][T11040] oom_kill_process+0xfe/0x550 [ 2864.852012][T11040] out_of_memory+0x620/0x880 [ 2864.856615][T11040] memory_max_write+0x31b/0x420 [ 2864.861449][T11040] ? memory_max_show+0x70/0x70 [ 2864.866259][T11040] cgroup_file_write+0x167/0x300 [ 2864.871223][T11040] ? __check_object_size+0x235/0x380 [ 2864.876536][T11040] ? cgroup_seqfile_stop+0x70/0x70 [ 2864.881683][T11040] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2864.886989][T11040] vfs_write+0x71c/0x890 [ 2864.891229][T11040] ksys_write+0xe8/0x1a0 [ 2864.895454][T11040] __x64_sys_write+0x3e/0x50 [ 2864.900141][T11040] do_syscall_64+0x2b/0x70 [ 2864.904557][T11040] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2864.910430][T11040] RIP: 0033:0x7fce18d590e9 [ 2864.914821][T11040] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2864.934483][T11040] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2864.942933][T11040] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2864.951214][T11040] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2864.959220][T11040] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2864.967211][T11040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2864.975176][T11040] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2864.983142][T11040] [ 2864.986170][T11040] memory: usage 920kB, limit 0kB, failcnt 13825 [ 2864.992401][T11040] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2864.999246][T11040] Memory cgroup stats for /syz0: [ 2865.002808][T11040] anon 32768 [ 2865.002808][T11040] file 118784 [ 2865.002808][T11040] kernel 139264 [ 2865.002808][T11040] kernel_stack 0 [ 2865.002808][T11040] pagetables 8192 [ 2865.002808][T11040] percpu 0 [ 2865.002808][T11040] sock 651264 [ 2865.002808][T11040] vmalloc 0 [ 2865.002808][T11040] shmem 118784 [ 2865.002808][T11040] file_mapped 118784 [ 2865.002808][T11040] file_dirty 0 [ 2865.002808][T11040] file_writeback 0 [ 2865.002808][T11040] swapcached 0 [ 2865.002808][T11040] inactive_anon 90112 [ 2865.002808][T11040] active_anon 61440 [ 2865.002808][T11040] inactive_file 0 [ 2865.002808][T11040] active_file 0 [ 2865.002808][T11040] unevictable 0 [ 2865.002808][T11040] slab_reclaimable 7784 [ 2865.002808][T11040] slab_unreclaimable 111520 [ 2865.002808][T11040] slab 119304 [ 2865.002808][T11040] workingset_refault_anon 0 [ 2865.002808][T11040] workingset_refault_file 48 [ 2865.002808][T11040] workingset_activate_anon 0 [ 2865.002808][T11040] workingset_activate_file 0 23:17:20 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, 0x0, 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2865.097168][T11040] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=10994,uid=0 [ 2865.112519][T11040] Memory cgroup out of memory: Killed process 10994 (syz-executor.0) total-vm:42336kB, anon-rss:364kB, file-rss:8192kB, shmem-rss:0kB, UID:0 pgtables:68kB oom_score_adj:0 [ 2865.145750][T11040] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2865.155958][T11040] CPU: 1 PID: 11040 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2865.166498][T11040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2865.177161][T11040] Call Trace: [ 2865.180463][T11040] [ 2865.183376][T11040] dump_stack_lvl+0xd6/0x122 [ 2865.187949][T11040] dump_stack+0x11/0x12 [ 2865.192097][T11040] dump_header+0x98/0x410 [ 2865.196480][T11040] out_of_memory+0x65e/0x880 [ 2865.201055][T11040] memory_max_write+0x31b/0x420 [ 2865.205896][T11040] ? memory_max_show+0x70/0x70 [ 2865.210695][T11040] cgroup_file_write+0x167/0x300 [ 2865.215621][T11040] ? __check_object_size+0x235/0x380 [ 2865.220905][T11040] ? cgroup_seqfile_stop+0x70/0x70 [ 2865.226025][T11040] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2865.231312][T11040] vfs_write+0x71c/0x890 [ 2865.235554][T11040] ksys_write+0xe8/0x1a0 [ 2865.239778][T11040] __x64_sys_write+0x3e/0x50 [ 2865.244361][T11040] do_syscall_64+0x2b/0x70 [ 2865.248761][T11040] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2865.254699][T11040] RIP: 0033:0x7fce18d590e9 [ 2865.259095][T11040] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2865.278685][T11040] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2865.287094][T11040] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2865.295077][T11040] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2865.303038][T11040] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2865.311032][T11040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2865.319008][T11040] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2865.326962][T11040] [ 2865.330288][T11040] memory: usage 876kB, limit 0kB, failcnt 13861 [ 2865.336542][T11040] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2865.343366][T11040] Memory cgroup stats for /syz0: [ 2865.344860][T11040] anon 0 [ 2865.344860][T11040] file 118784 [ 2865.344860][T11040] kernel 122880 [ 2865.344860][T11040] kernel_stack 0 [ 2865.344860][T11040] pagetables 0 [ 2865.344860][T11040] percpu 0 [ 2865.344860][T11040] sock 651264 [ 2865.344860][T11040] vmalloc 0 [ 2865.344860][T11040] shmem 118784 [ 2865.344860][T11040] file_mapped 118784 [ 2865.344860][T11040] file_dirty 0 [ 2865.344860][T11040] file_writeback 0 [ 2865.344860][T11040] swapcached 0 [ 2865.344860][T11040] inactive_anon 57344 [ 2865.344860][T11040] active_anon 61440 23:17:21 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2865.344860][T11040] inactive_file 0 [ 2865.344860][T11040] active_file 0 [ 2865.344860][T11040] unevictable 0 [ 2865.344860][T11040] slab_reclaimable 4632 [ 2865.344860][T11040] slab_unreclaimable 111280 [ 2865.344860][T11040] slab 115912 [ 2865.344860][T11040] workingset_refault_anon 0 [ 2865.344860][T11040] workingset_refault_file 48 [ 2865.344860][T11040] workingset_activate_anon 0 [ 2865.344860][T11040] workingset_activate_file 0 [ 2865.439342][T11040] Out of memory and no killable processes... 23:17:21 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x2, 0xb, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x28}}, 0x0) 23:17:21 executing program 0: socketpair(0x1d, 0x0, 0x40, &(0x7f0000000000)) 23:17:21 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 23:17:21 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0xffffffffffffffff, 0x0) 23:17:21 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x18}}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg0\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={@private1, 0x0, r1}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r3, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x4, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) 23:17:21 executing program 4: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x641c0000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)) syz_clone(0x20000000, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000580)={0xe, 0x18, 0xfa00, @ib_path={0x0, 0xffffffffffffffff, 0x1, 0x1, 0x400000}}, 0x20) [ 2865.666733][T11055] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2865.676989][T11055] CPU: 1 PID: 11055 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2865.687490][T11055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2865.697658][T11055] Call Trace: [ 2865.700937][T11055] [ 2865.703868][T11055] dump_stack_lvl+0xd6/0x122 [ 2865.708464][T11055] dump_stack+0x11/0x12 [ 2865.712624][T11055] dump_header+0x98/0x410 23:17:21 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000540)) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, 0x0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000080), 0x10) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x641c0000, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(r0, 0x0) syz_clone(0x20000000, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000580)={0xe, 0x18, 0xfa00, @ib_path={0x0, 0xffffffffffffffff, 0x1, 0x1, 0x400000}}, 0x20) socket$inet_udplite(0x2, 0x2, 0x88) 23:17:21 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, 0x0, 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2865.717018][T11055] out_of_memory+0x65e/0x880 [ 2865.721638][T11055] memory_max_write+0x31b/0x420 [ 2865.726525][T11055] ? memory_max_show+0x70/0x70 [ 2865.731298][T11055] cgroup_file_write+0x167/0x300 [ 2865.736242][T11055] ? cgroup_seqfile_stop+0x70/0x70 [ 2865.741417][T11055] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2865.746760][T11055] vfs_write+0x71c/0x890 [ 2865.751051][T11055] ksys_write+0xe8/0x1a0 [ 2865.755404][T11055] __x64_sys_write+0x3e/0x50 [ 2865.760071][T11055] do_syscall_64+0x2b/0x70 [ 2865.764491][T11055] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2865.770390][T11055] RIP: 0033:0x7fce18d590e9 [ 2865.774801][T11055] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2865.794574][T11055] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2865.802990][T11055] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2865.810966][T11055] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2865.818940][T11055] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2865.826916][T11055] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2865.834936][T11055] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2865.842930][T11055] [ 2865.846050][T11055] memory: usage 864kB, limit 0kB, failcnt 13861 [ 2865.852286][T11055] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2865.859142][T11055] Memory cgroup stats for /syz0: [ 2865.863156][T11055] anon 0 [ 2865.863156][T11055] file 118784 [ 2865.863156][T11055] kernel 114688 [ 2865.863156][T11055] kernel_stack 0 [ 2865.863156][T11055] pagetables 0 [ 2865.863156][T11055] percpu 0 [ 2865.863156][T11055] sock 651264 [ 2865.863156][T11055] vmalloc 0 [ 2865.863156][T11055] shmem 118784 [ 2865.863156][T11055] file_mapped 118784 [ 2865.863156][T11055] file_dirty 0 [ 2865.863156][T11055] file_writeback 0 [ 2865.863156][T11055] swapcached 0 [ 2865.863156][T11055] inactive_anon 57344 [ 2865.863156][T11055] active_anon 61440 23:17:21 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2865.863156][T11055] inactive_file 0 [ 2865.863156][T11055] active_file 0 [ 2865.863156][T11055] unevictable 0 [ 2865.863156][T11055] slab_reclaimable 3256 [ 2865.863156][T11055] slab_unreclaimable 107736 [ 2865.863156][T11055] slab 110992 [ 2865.863156][T11055] workingset_refault_anon 0 [ 2865.863156][T11055] workingset_refault_file 48 [ 2865.863156][T11055] workingset_activate_anon 0 [ 2865.863156][T11055] workingset_activate_file 0 [ 2865.957451][T11055] Out of memory and no killable processes... 23:17:21 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x18}}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg0\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={@private1, 0x0, r1}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x4, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) 23:17:22 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, 0x0, 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2866.198506][T29600] device hsr_slave_0 left promiscuous mode [ 2866.204884][T29600] device hsr_slave_1 left promiscuous mode [ 2866.207079][T11075] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2866.221031][T11075] CPU: 1 PID: 11075 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2866.231546][T11075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2866.241742][T11075] Call Trace: [ 2866.245003][T11075] [ 2866.247919][T11075] dump_stack_lvl+0xd6/0x122 [ 2866.252496][T11075] dump_stack+0x11/0x12 [ 2866.256636][T11075] dump_header+0x98/0x410 [ 2866.260959][T11075] out_of_memory+0x65e/0x880 [ 2866.265583][T11075] memory_max_write+0x31b/0x420 [ 2866.270484][T11075] ? memory_max_show+0x70/0x70 [ 2866.275234][T11075] cgroup_file_write+0x167/0x300 [ 2866.280167][T11075] ? __check_object_size+0x235/0x380 [ 2866.285457][T11075] ? cgroup_seqfile_stop+0x70/0x70 [ 2866.290604][T11075] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2866.295925][T11075] vfs_write+0x71c/0x890 [ 2866.300169][T11075] ksys_write+0xe8/0x1a0 [ 2866.304452][T11075] __x64_sys_write+0x3e/0x50 [ 2866.309085][T11075] do_syscall_64+0x2b/0x70 [ 2866.313507][T11075] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2866.319458][T11075] RIP: 0033:0x7fce18d590e9 [ 2866.323854][T11075] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2866.343445][T11075] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2866.351844][T11075] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2866.359804][T11075] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2866.367763][T11075] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2866.375718][T11075] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2866.383679][T11075] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2866.391643][T11075] 23:17:22 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) [ 2866.394786][T11075] memory: usage 864kB, limit 0kB, failcnt 13861 [ 2866.401041][T11075] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2866.407898][T11075] Memory cgroup stats for /syz0: [ 2866.408277][T29600] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2866.410548][T11075] anon 0 [ 2866.410548][T11075] file 118784 [ 2866.410548][T11075] kernel 114688 [ 2866.410548][T11075] kernel_stack 0 [ 2866.410548][T11075] pagetables 0 [ 2866.410548][T11075] percpu 0 [ 2866.410548][T11075] sock 651264 [ 2866.410548][T11075] vmalloc 0 [ 2866.410548][T11075] shmem 118784 [ 2866.410548][T11075] file_mapped 118784 [ 2866.410548][T11075] file_dirty 0 [ 2866.410548][T11075] file_writeback 0 [ 2866.410548][T11075] swapcached 0 [ 2866.410548][T11075] inactive_anon 57344 [ 2866.410548][T11075] active_anon 61440 [ 2866.410548][T11075] inactive_file 0 [ 2866.410548][T11075] active_file 0 [ 2866.410548][T11075] unevictable 0 [ 2866.410548][T11075] slab_reclaimable 3256 [ 2866.410548][T11075] slab_unreclaimable 107736 [ 2866.410548][T11075] slab 110992 [ 2866.410548][T11075] workingset_refault_anon 0 [ 2866.410548][T11075] workingset_refault_file 48 [ 2866.410548][T11075] workingset_activate_anon 0 [ 2866.410548][T11075] workingset_activate_file 0 [ 2866.413316][T29600] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2866.420589][T11075] Out of memory and no killable processes... [ 2866.523562][T29600] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2866.531128][T29600] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2866.539013][T29600] device bridge_slave_1 left promiscuous mode [ 2866.545202][T29600] bridge0: port 2(bridge_slave_1) entered disabled state [ 2866.552754][T29600] device bridge_slave_0 left promiscuous mode [ 2866.559064][T29600] bridge0: port 1(bridge_slave_0) entered disabled state [ 2866.569562][T29600] device veth1_macvtap left promiscuous mode [ 2866.575605][T29600] device veth0_macvtap left promiscuous mode [ 2866.581608][T29600] device veth1_vlan left promiscuous mode [ 2866.587430][T29600] device veth0_vlan left promiscuous mode 23:17:22 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x12) [ 2866.652449][T11085] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2866.663183][T11085] CPU: 0 PID: 11085 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2866.673686][T11085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2866.683721][T11085] Call Trace: [ 2866.686981][T11085] [ 2866.689973][T11085] dump_stack_lvl+0xd6/0x122 [ 2866.694579][T11085] dump_stack+0x11/0x12 [ 2866.698715][T11085] dump_header+0x98/0x410 [ 2866.703024][T11085] out_of_memory+0x65e/0x880 [ 2866.707671][T11085] memory_max_write+0x31b/0x420 [ 2866.712504][T11085] ? memory_max_show+0x70/0x70 [ 2866.717324][T11085] cgroup_file_write+0x167/0x300 [ 2866.722311][T11085] ? __check_object_size+0x235/0x380 [ 2866.727577][T11085] ? cgroup_seqfile_stop+0x70/0x70 [ 2866.732691][T11085] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2866.737964][T11085] vfs_write+0x71c/0x890 [ 2866.742234][T11085] ksys_write+0xe8/0x1a0 [ 2866.746459][T11085] __x64_sys_write+0x3e/0x50 [ 2866.751070][T11085] do_syscall_64+0x2b/0x70 [ 2866.755536][T11085] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2866.761431][T11085] RIP: 0033:0x7fce18d590e9 [ 2866.765898][T11085] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2866.785578][T11085] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2866.793974][T11085] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2866.801933][T11085] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2866.809970][T11085] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2866.817928][T11085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2866.825891][T11085] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2866.833908][T11085] [ 2866.836969][T11085] memory: usage 864kB, limit 0kB, failcnt 13861 [ 2866.843278][T11085] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2866.850208][T11085] Memory cgroup stats for /syz0: [ 2866.851535][T11085] anon 0 [ 2866.851535][T11085] file 118784 [ 2866.851535][T11085] kernel 114688 [ 2866.851535][T11085] kernel_stack 0 [ 2866.851535][T11085] pagetables 0 [ 2866.851535][T11085] percpu 0 [ 2866.851535][T11085] sock 651264 [ 2866.851535][T11085] vmalloc 0 [ 2866.851535][T11085] shmem 118784 [ 2866.851535][T11085] file_mapped 118784 [ 2866.851535][T11085] file_dirty 0 [ 2866.851535][T11085] file_writeback 0 [ 2866.851535][T11085] swapcached 0 [ 2866.851535][T11085] inactive_anon 57344 [ 2866.851535][T11085] active_anon 61440 [ 2866.851535][T11085] inactive_file 0 [ 2866.851535][T11085] active_file 0 [ 2866.851535][T11085] unevictable 0 [ 2866.851535][T11085] slab_reclaimable 3256 [ 2866.851535][T11085] slab_unreclaimable 107736 [ 2866.851535][T11085] slab 110992 [ 2866.851535][T11085] workingset_refault_anon 0 [ 2866.851535][T11085] workingset_refault_file 48 [ 2866.851535][T11085] workingset_activate_anon 0 [ 2866.851535][T11085] workingset_activate_file 0 [ 2866.945213][T11085] Out of memory and no killable processes... [ 2867.016351][T29600] team0 (unregistering): Port device team_slave_1 removed [ 2867.027696][T29600] team0 (unregistering): Port device team_slave_0 removed [ 2867.037332][T29600] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2867.049925][T29600] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2867.079485][T29600] bond0 (unregistering): Released all slaves [ 2867.316230][T11093] chnl_net:caif_netlink_parms(): no params data found [ 2867.348471][T11093] bridge0: port 1(bridge_slave_0) entered blocking state [ 2867.355586][T11093] bridge0: port 1(bridge_slave_0) entered disabled state [ 2867.364021][T11093] device bridge_slave_0 entered promiscuous mode [ 2867.373923][T11093] bridge0: port 2(bridge_slave_1) entered blocking state [ 2867.381028][T11093] bridge0: port 2(bridge_slave_1) entered disabled state [ 2867.388812][T11093] device bridge_slave_1 entered promiscuous mode [ 2867.405712][T11093] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2867.416262][T11093] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2867.436745][T11093] team0: Port device team_slave_0 added [ 2867.443250][T11093] team0: Port device team_slave_1 added [ 2867.457978][T11093] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2867.465041][T11093] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2867.491011][T11093] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2867.502329][T11093] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2867.509363][T11093] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2867.535273][T11093] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2867.562983][T11093] device hsr_slave_0 entered promiscuous mode [ 2867.569698][T11093] device hsr_slave_1 entered promiscuous mode [ 2867.576473][T11093] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2867.584043][T11093] Cannot create hsr debugfs directory [ 2867.618471][T11093] bridge0: port 2(bridge_slave_1) entered blocking state [ 2867.625623][T11093] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2867.632879][T11093] bridge0: port 1(bridge_slave_0) entered blocking state [ 2867.639987][T11093] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2867.666676][T11093] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2867.677970][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2867.691001][ T9279] bridge0: port 1(bridge_slave_0) entered disabled state [ 2867.699209][ T9279] bridge0: port 2(bridge_slave_1) entered disabled state [ 2867.712151][T11093] 8021q: adding VLAN 0 to HW filter on device team0 [ 2867.722375][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2867.730950][ T6136] bridge0: port 1(bridge_slave_0) entered blocking state [ 2867.738036][ T6136] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2867.749543][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2867.758143][ T6136] bridge0: port 2(bridge_slave_1) entered blocking state [ 2867.765179][ T6136] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2867.779869][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2867.788546][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2867.799307][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2867.817722][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2867.828588][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2867.837669][T11093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2867.849710][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2867.862515][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2867.872374][T11093] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2867.956326][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2867.997374][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2868.006114][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2868.013676][ T6136] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2868.022681][T11093] device veth0_vlan entered promiscuous mode [ 2868.031412][T11093] device veth1_vlan entered promiscuous mode [ 2868.043340][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2868.051240][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2868.059394][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2868.069005][T11093] device veth0_macvtap entered promiscuous mode [ 2868.076930][T11093] device veth1_macvtap entered promiscuous mode [ 2868.087456][T11093] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2868.097910][T11093] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2868.107719][T11093] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2868.118174][T11093] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2868.128014][T11093] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2868.138420][T11093] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2868.148320][T11093] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2868.158730][T11093] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2868.168550][T11093] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2868.178977][T11093] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2868.188836][T11093] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2868.199269][T11093] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2868.210509][T11093] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2868.218174][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2868.227663][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2868.236916][T11093] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2868.247400][T11093] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2868.257275][T11093] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2868.267694][T11093] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2868.278079][T11093] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2868.288609][T11093] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2868.298493][T11093] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2868.308907][T11093] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2868.318768][T11093] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2868.329275][T11093] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2868.339119][T11093] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2868.349547][T11093] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2868.360800][T11093] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2868.369664][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2868.378321][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 23:17:24 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x20, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x40084503, &(0x7f0000000040)) 23:17:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)={{0x14}, [@NFT_MSG_DELRULE={0x20, 0x8, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELTABLE={0x18, 0x2, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_TABLE_USERDATA={0x4}]}, @NFT_MSG_DELRULE={0x14, 0x8, 0xa, 0x201}], {0x14}}, 0x74}}, 0x0) 23:17:24 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x12) 23:17:24 executing program 4: select(0x40, &(0x7f0000000080), 0x0, 0xffffffffffffffff, 0x0) 23:17:24 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:24 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x18}}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg0\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={@private1, 0x0, r1}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x4, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) 23:17:24 executing program 4: socketpair(0x0, 0x8000f, 0x0, &(0x7f0000000000)) 23:17:24 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x18}}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg0\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={@private1, 0x0, r1}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x4, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) 23:17:24 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCGID(r0, 0x541b, 0x0) [ 2868.484221][T11093] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2868.494181][T11093] CPU: 1 PID: 11093 Comm: syz-executor.0 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2868.504684][T11093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2868.514739][T11093] Call Trace: [ 2868.518079][T11093] [ 2868.521065][T11093] dump_stack_lvl+0xd6/0x122 [ 2868.525671][T11093] dump_stack+0x11/0x12 [ 2868.529809][T11093] dump_header+0x98/0x410 [ 2868.534159][T11093] oom_kill_process+0xfe/0x550 [ 2868.538941][T11093] out_of_memory+0x620/0x880 [ 2868.543531][T11093] mem_cgroup_oom+0x475/0x4f0 [ 2868.548198][T11093] try_charge_memcg+0x746/0x960 [ 2868.553080][T11093] ? load_balance+0x88a/0xcd0 [ 2868.557752][T11093] obj_cgroup_charge+0x171/0x2b0 [ 2868.562698][T11093] memcg_slab_pre_alloc_hook+0xf7/0x170 [ 2868.568239][T11093] ? __d_alloc+0x3d/0x380 [ 2868.572558][T11093] kmem_cache_alloc_lru+0x76/0x2b0 [ 2868.577653][T11093] __d_alloc+0x3d/0x380 [ 2868.581803][T11093] d_alloc_parallel+0x51/0xcc0 [ 2868.586545][T11093] ? selinux_inode_permission+0x2d8/0x400 [ 2868.592321][T11093] ? selinux_inode_permission+0x335/0x400 [ 2868.598047][T11093] ? lockref_get_not_dead+0xeb/0x190 [ 2868.603311][T11093] ? __rcu_read_unlock+0x4a/0x70 [ 2868.608315][T11093] ? __down_read_common+0x16c/0x4c0 [ 2868.613495][T11093] __lookup_slow+0x80/0x250 [ 2868.618034][T11093] lookup_slow+0x3c/0x60 [ 2868.622253][T11093] walk_component+0x23d/0x280 [ 2868.626930][T11093] path_lookupat+0x11d/0x2b0 [ 2868.631499][T11093] filename_lookup+0x130/0x310 [ 2868.636244][T11093] user_path_at_empty+0x3e/0x110 [ 2868.641270][T11093] __x64_sys_umount+0x84/0xe0 [ 2868.645926][T11093] do_syscall_64+0x2b/0x70 [ 2868.650334][T11093] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2868.656230][T11093] RIP: 0033:0x7fcba63f2557 [ 2868.660622][T11093] Code: ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2868.680265][T11093] RSP: 002b:00007ffc4f459468 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 2868.688741][T11093] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fcba63f2557 [ 2868.696696][T11093] RDX: 00007ffc4f45953e RSI: 000000000000000a RDI: 00007ffc4f459530 [ 2868.704656][T11093] RBP: 00007ffc4f459530 R08: 00000000ffffffff R09: 00007ffc4f459300 [ 2868.712610][T11093] R10: 0000555555eef7c3 R11: 0000000000000246 R12: 00007fcba644a1f8 [ 2868.720558][T11093] R13: 00007ffc4f45a5f0 R14: 0000555555eef6f0 R15: 00007ffc4f45a630 [ 2868.728508][T11093] 23:17:24 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x12) [ 2868.731750][T11093] memory: usage 924kB, limit 0kB, failcnt 13880 [ 2868.737993][T11093] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2868.744815][T11093] Memory cgroup stats for /syz0: [ 2868.745321][T11093] anon 36864 [ 2868.745321][T11093] file 118784 [ 2868.745321][T11093] kernel 139264 [ 2868.745321][T11093] kernel_stack 0 [ 2868.745321][T11093] pagetables 8192 [ 2868.745321][T11093] percpu 0 [ 2868.745321][T11093] sock 651264 [ 2868.745321][T11093] vmalloc 0 [ 2868.745321][T11093] shmem 118784 [ 2868.745321][T11093] file_mapped 118784 [ 2868.745321][T11093] file_dirty 0 [ 2868.745321][T11093] file_writeback 0 [ 2868.745321][T11093] swapcached 0 [ 2868.745321][T11093] inactive_anon 94208 [ 2868.745321][T11093] active_anon 61440 [ 2868.745321][T11093] inactive_file 0 [ 2868.745321][T11093] active_file 0 [ 2868.745321][T11093] unevictable 0 [ 2868.745321][T11093] slab_reclaimable 8960 [ 2868.745321][T11093] slab_unreclaimable 111520 [ 2868.745321][T11093] slab 120480 [ 2868.745321][T11093] workingset_refault_anon 0 [ 2868.745321][T11093] workingset_refault_file 48 [ 2868.745321][T11093] workingset_activate_anon 0 [ 2868.745321][T11093] workingset_activate_file 0 [ 2868.839589][T11093] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=11093,uid=0 [ 2868.855007][T11093] Memory cgroup out of memory: Killed process 11093 (syz-executor.0) total-vm:42336kB, anon-rss:364kB, file-rss:8192kB, shmem-rss:0kB, UID:0 pgtables:68kB oom_score_adj:0 [ 2868.878720][T11133] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2868.889079][T11133] CPU: 1 PID: 11133 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2868.899559][T11133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2868.909592][T11133] Call Trace: [ 2868.912851][T11133] [ 2868.915765][T11133] dump_stack_lvl+0xd6/0x122 [ 2868.920356][T11133] dump_stack+0x11/0x12 [ 2868.924493][T11133] dump_header+0x98/0x410 [ 2868.928804][T11133] out_of_memory+0x65e/0x880 [ 2868.933383][T11133] memory_max_write+0x31b/0x420 [ 2868.938218][T11133] ? memory_max_show+0x70/0x70 [ 2868.943008][T11133] cgroup_file_write+0x167/0x300 [ 2868.947935][T11133] ? cgroup_seqfile_stop+0x70/0x70 [ 2868.953118][T11133] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2868.958396][T11133] vfs_write+0x71c/0x890 [ 2868.962689][T11133] ksys_write+0xe8/0x1a0 [ 2868.966941][T11133] __x64_sys_write+0x3e/0x50 [ 2868.971512][T11133] do_syscall_64+0x2b/0x70 [ 2868.975947][T11133] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2868.981851][T11133] RIP: 0033:0x7fce18d590e9 [ 2868.986245][T11133] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2869.005835][T11133] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2869.014226][T11133] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2869.022225][T11133] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2869.030228][T11133] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2869.038179][T11133] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2869.046129][T11133] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2869.054107][T11133] [ 2869.057199][T11133] memory: usage 872kB, limit 0kB, failcnt 13897 [ 2869.063590][T11133] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2869.070556][T11133] Memory cgroup stats for /syz0: [ 2869.074479][T11133] anon 0 [ 2869.074479][T11133] file 118784 [ 2869.074479][T11133] kernel 122880 [ 2869.074479][T11133] kernel_stack 0 [ 2869.074479][T11133] pagetables 0 [ 2869.074479][T11133] percpu 0 [ 2869.074479][T11133] sock 651264 [ 2869.074479][T11133] vmalloc 0 [ 2869.074479][T11133] shmem 118784 [ 2869.074479][T11133] file_mapped 118784 [ 2869.074479][T11133] file_dirty 0 [ 2869.074479][T11133] file_writeback 0 [ 2869.074479][T11133] swapcached 0 [ 2869.074479][T11133] inactive_anon 57344 [ 2869.074479][T11133] active_anon 61440 [ 2869.074479][T11133] inactive_file 0 [ 2869.074479][T11133] active_file 0 23:17:25 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:25 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18}, './file0\x00'}) [ 2869.074479][T11133] unevictable 0 [ 2869.074479][T11133] slab_reclaimable 4632 [ 2869.074479][T11133] slab_unreclaimable 111280 [ 2869.074479][T11133] slab 115912 [ 2869.074479][T11133] workingset_refault_anon 0 [ 2869.074479][T11133] workingset_refault_file 48 [ 2869.074479][T11133] workingset_activate_anon 0 [ 2869.074479][T11133] workingset_activate_file 0 [ 2869.168526][T11133] Out of memory and no killable processes... 23:17:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000001c80)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_NEWSETELEM={0x14, 0xc, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 23:17:25 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x18}}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg0\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r2, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x4, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) 23:17:25 executing program 4: syz_clone(0x899eb400, 0x0, 0x0, 0x0, 0x0, 0x0) 23:17:25 executing program 1: socketpair(0x1, 0x2, 0x0, &(0x7f00000000c0)) 23:17:25 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 23:17:25 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x18}}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg0\x00'}) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r1, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x4, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) 23:17:25 executing program 1: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000080)) ioctl$NS_GET_OWNER_UID(r0, 0xb704, 0x0) 23:17:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3}, 0x14}}, 0x0) [ 2869.478086][T11158] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2869.488509][T11158] CPU: 0 PID: 11158 Comm: syz-executor.3 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2869.499011][T11158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2869.509069][T11158] Call Trace: [ 2869.512389][T11158] [ 2869.515320][T11158] dump_stack_lvl+0xd6/0x122 [ 2869.519919][T11158] dump_stack+0x11/0x12 [ 2869.524094][T11158] dump_header+0x98/0x410 [ 2869.528432][T11158] out_of_memory+0x65e/0x880 [ 2869.533027][T11158] memory_max_write+0x31b/0x420 [ 2869.537893][T11158] ? memory_max_show+0x70/0x70 [ 2869.542681][T11158] cgroup_file_write+0x167/0x300 [ 2869.547629][T11158] ? __check_object_size+0x235/0x380 [ 2869.552918][T11158] ? cgroup_seqfile_stop+0x70/0x70 [ 2869.558097][T11158] kernfs_fop_write_iter+0x1d3/0x2c0 [ 2869.563394][T11158] vfs_write+0x71c/0x890 [ 2869.567709][T11158] ksys_write+0xe8/0x1a0 [ 2869.572124][T11158] __x64_sys_write+0x3e/0x50 23:17:25 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x2, 0xa, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, 0x28}}, 0x0) 23:17:25 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x18}}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg0\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r1, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x4, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) [ 2869.576740][T11158] do_syscall_64+0x2b/0x70 [ 2869.581162][T11158] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2869.587059][T11158] RIP: 0033:0x7fce18d590e9 [ 2869.591468][T11158] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2869.611089][T11158] RSP: 002b:00007fce184cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2869.619505][T11158] RAX: ffffffffffffffda RBX: 00007fce18e6bf60 RCX: 00007fce18d590e9 [ 2869.627539][T11158] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 000000000000000d [ 2869.635516][T11158] RBP: 00007fce18db308d R08: 0000000000000000 R09: 0000000000000000 [ 2869.643500][T11158] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2869.651472][T11158] R13: 00007fff23895bcf R14: 00007fce184cf300 R15: 0000000000022000 [ 2869.659560][T11158] [ 2869.663143][T11158] memory: usage 864kB, limit 0kB, failcnt 13897 [ 2869.669516][T11158] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2869.677015][T11158] Memory cgroup stats for /syz0: [ 2869.745379][T11158] anon 0 [ 2869.745379][T11158] file 118784 [ 2869.745379][T11158] kernel 114688 [ 2869.745379][T11158] kernel_stack 0 [ 2869.745379][T11158] pagetables 0 [ 2869.745379][T11158] percpu 0 [ 2869.745379][T11158] sock 651264 [ 2869.745379][T11158] vmalloc 0 [ 2869.745379][T11158] shmem 118784 [ 2869.745379][T11158] file_mapped 118784 [ 2869.745379][T11158] file_dirty 0 [ 2869.745379][T11158] file_writeback 0 [ 2869.745379][T11158] swapcached 0 23:17:25 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:25 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x18}}, 0x1c, 0x0}}], 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r1, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x4, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) [ 2869.745379][T11158] inactive_anon 57344 [ 2869.745379][T11158] active_anon 61440 [ 2869.745379][T11158] inactive_file 0 [ 2869.745379][T11158] active_file 0 [ 2869.745379][T11158] unevictable 0 [ 2869.745379][T11158] slab_reclaimable 3256 [ 2869.745379][T11158] slab_unreclaimable 107736 [ 2869.745379][T11158] slab 110992 [ 2869.745379][T11158] workingset_refault_anon 0 [ 2869.745379][T11158] workingset_refault_file 48 [ 2869.745379][T11158] workingset_activate_anon 0 [ 2869.745379][T11158] workingset_activate_file 0 [ 2869.839569][T11158] Out of memory and no killable processes... [ 2869.959569][T29609] device hsr_slave_0 left promiscuous mode [ 2869.969281][T29609] device hsr_slave_1 left promiscuous mode [ 2869.975681][T29609] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2869.983133][T29609] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2869.991942][T29609] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2869.999518][T29609] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2870.008279][T29609] device bridge_slave_1 left promiscuous mode [ 2870.014389][T29609] bridge0: port 2(bridge_slave_1) entered disabled state [ 2870.022615][T29609] device bridge_slave_0 left promiscuous mode [ 2870.028803][T29609] bridge0: port 1(bridge_slave_0) entered disabled state [ 2870.039823][T29609] device veth1_macvtap left promiscuous mode [ 2870.045902][T29609] device veth0_macvtap left promiscuous mode [ 2870.051906][T29609] device veth1_vlan left promiscuous mode [ 2870.057710][T29609] device veth0_vlan left promiscuous mode [ 2870.158437][T29609] team0 (unregistering): Port device team_slave_1 removed [ 2870.168562][T29609] team0 (unregistering): Port device team_slave_0 removed [ 2870.178606][T29609] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2870.190047][T29609] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2870.218292][T29609] bond0 (unregistering): Released all slaves [ 2871.190406][T11181] chnl_net:caif_netlink_parms(): no params data found [ 2871.219629][T11181] bridge0: port 1(bridge_slave_0) entered blocking state [ 2871.226737][T11181] bridge0: port 1(bridge_slave_0) entered disabled state [ 2871.234454][T11181] device bridge_slave_0 entered promiscuous mode [ 2871.241992][T11181] bridge0: port 2(bridge_slave_1) entered blocking state [ 2871.249108][T11181] bridge0: port 2(bridge_slave_1) entered disabled state [ 2871.256960][T11181] device bridge_slave_1 entered promiscuous mode [ 2871.273041][T11181] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2871.283427][T11181] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2871.301868][T11181] team0: Port device team_slave_0 added [ 2871.308744][T11181] team0: Port device team_slave_1 added [ 2871.322754][T11181] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2871.329709][T11181] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2871.355592][T11181] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2871.366787][T11181] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2871.373718][T11181] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2871.399676][T11181] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2871.423109][T11181] device hsr_slave_0 entered promiscuous mode [ 2871.429586][T11181] device hsr_slave_1 entered promiscuous mode [ 2871.436007][T11181] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2871.443530][T11181] Cannot create hsr debugfs directory [ 2871.491832][T11181] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2871.502120][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2871.511498][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2871.520362][T11181] 8021q: adding VLAN 0 to HW filter on device team0 [ 2871.530357][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2871.539034][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2871.547395][ T9279] bridge0: port 1(bridge_slave_0) entered blocking state [ 2871.554430][ T9279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2871.562553][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2871.571566][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2871.581463][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2871.589789][ T1910] bridge0: port 2(bridge_slave_1) entered blocking state [ 2871.596871][ T1910] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2871.614710][T11181] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2871.625107][T11181] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2871.637696][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2871.646464][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2871.655328][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2871.663862][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2871.672425][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2871.681174][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2871.689684][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2871.697883][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2871.705527][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2871.719384][T11181] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2871.726573][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2871.734055][ T9279] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2871.801343][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2871.841886][T11181] device veth0_vlan entered promiscuous mode [ 2871.849074][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2871.857616][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2871.865359][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2871.875013][T11181] device veth1_vlan entered promiscuous mode [ 2871.888059][T11181] device veth0_macvtap entered promiscuous mode [ 2871.895054][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2871.903140][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2871.911575][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2871.919894][ T7472] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2871.928844][T11181] device veth1_macvtap entered promiscuous mode [ 2871.939993][T11181] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2871.950519][T11181] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2871.960317][T11181] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2871.970728][T11181] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2871.980522][T11181] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2871.990973][T11181] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2872.000785][T11181] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2872.011246][T11181] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2872.021045][T11181] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2872.031447][T11181] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2872.041287][T11181] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2872.051697][T11181] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2872.062937][T11181] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2872.071675][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2872.081536][T11181] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2872.092028][T11181] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2872.101863][T11181] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2872.112415][T11181] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2872.122229][T11181] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2872.132644][T11181] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2872.142465][T11181] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2872.152935][T11181] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2872.162780][T11181] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2872.173191][T11181] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2872.183014][T11181] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 23:17:28 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) sendto$l2tp(r0, &(0x7f00000001c0)="c6", 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @private}, 0x10) 23:17:28 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000000)={0x0, 0x1, &(0x7f0000000240)="11"}) 23:17:28 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x4, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) 23:17:28 executing program 1: socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$nfc_llcp(r0, 0x0, 0x0, 0x0) 23:17:28 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:28 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) [ 2872.193417][T11181] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2872.204586][T11181] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2872.215449][T10079] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 23:17:28 executing program 4: syz_emit_ethernet(0xfdef, &(0x7f0000000080)={@broadcast, @broadcast, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x6000, 0x0, 0x2, 0x0, @multicast1, @local}, {0x0, 0x0, 0x0, @loopback}}}}}, 0x0) 23:17:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x4, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) 23:17:28 executing program 1: socket(0x1d, 0x0, 0x3) 23:17:28 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:28 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x0, 0x0, 0x0, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3, 0x6, 0x1, 0x2, 0x0, 0xc7, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0xf92f, 0x4280, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, r0, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) [ 2872.292108][ T24] audit: type=1400 audit(1652311048.130:632): avc: denied { accept } for pid=11221 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 23:17:28 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000002f80)='ns/mnt\x00') 23:17:28 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCGID(r0, 0x80004507, 0x0) 23:17:28 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x4, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) 23:17:28 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:28 executing program 1: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x30, 0xffffffffffffffff, 0x8000000) 23:17:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000003a40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003a00)=[@rights={{0x10}}], 0x10}, 0x0) [ 2872.475812][T11238] can: request_module (can-proto-3) failed. 23:17:28 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@broadcast, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @broadcast}, @address_reply}}}}, 0x0) 23:17:28 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x2, 0xa, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x5, 0x0, 0x80, 0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, 0x28}}, 0x0) 23:17:28 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x4, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) 23:17:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000001c80)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_DELFLOWTABLE={0x28, 0x18, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8}]}, @NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_ID={0x8}]}, @NFT_MSG_NEWSETELEM={0xe24, 0xc, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0xe04, 0x3, 0x0, 0x1, [{0xe00, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_USERDATA={0xdd, 0x6, 0x1, 0x0, "da9f153e426ac04c21058cfa85819d98f7d444c3c7ddc9c062c6a22104dffb6c494d63db4158527baf4620bee82fe56bbb08ae29983199cc0df3b75e2fc495438755afb2d8864de978742ef1d7ead0ee0d4fa943924f595ad01cee5917c252b8a28757af54bdb30dfb47ee1707f53442d947571ce16e76efceac1ed0b3a4e6bfd4fcdebbba8481205668eb7c401f3a1e2c7c0a098c4df961ada9a3130c1cbc922191b58a269fd11b3b64e1d3a5fb522be02b1f601583a2a55869a711d3c8bf89880e92811e5d9e05d4618246cc46fcc8605dd5e2e0b8e632ef"}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_DATA={0x290, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x5c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0xdd, 0x1, "209e3355991ae616d669bffb97ca3163fec29426cdbec4fe158e8421c32cb248ca8afa353313f1d0ce511127b740d5b8e8d1bba3fd97fb782ca01942b189dae14bbf4a6c51e4055a3739f02dc5acd95908180bde27876cc3ab5c8aa665753d0af8225acde736c7a94d8066308a8da407800b01ac2ea9845eafb8dd5f52bea8ed5f2c6197ba78e70a8768a3512485654da1f59a498fa3ec168caa36a6bd3fa0dc8b7fbba4fdd5793936c6632a520e5dcb5ab96216476f94c9a15d2d104e8a8273eb64d9d1043025f095f193a6b43df959d3f7f5b500302b1db5"}, @NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}]}, @NFTA_DATA_VALUE={0x91, 0x1, "79ebeb8fda319f5c3e34a9926a7933f01bd9a6baea896953032655384adc7e97cd98a9ef0e02946c5b0ae911767bae244d87faf0f5af1694bb6defeedaffbf4659f952391c1f9fd84f00fdd424e49788ecf69712f6e07082ccb5cb994bd6418c540b2fdf067d7a4ce3e8432228d245dccd391d35b983adcf69209636849f1fec4a809e8bd76190f60aefc0ec02"}, @NFTA_DATA_VALUE={0x61, 0x1, "5d687350c0e80172b1b3f4e3eb1bfc38a2918db833821710f044b9115bdc1ac43bb1c89088f298dd49d1f563a9648ceba75ce83f498ba4541953a41ad871f6ce6190dcdab9cabfe019015a753c69a91db04146d69adf935b81b1ba959d"}]}, @NFTA_SET_ELEM_USERDATA={0x9d, 0x6, 0x1, 0x0, "c706dd6c971a7ed30d137a11317ca9992285a6c4f19d8bf54eb3d39404c774072ae7143e6745191b5f6ea3ec9b7a8d7bd9ecd459b76cccff8828e9aa43c4c9e5a941ad1223101c20bdb37314aa4af210b206b20811e3f4886c301070a7a012248c64b95070beb13a108edbe8ae6ccf0e4bd5b022d713569c30ea82d5831dd871e8d5ac9ee5e644fc5d41f0717bc5ab3c9cfadd2ae56cda6c73"}, @NFTA_SET_ELEM_USERDATA={0x9ad, 0x6, 0x1, 0x0, "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"}]}]}]}, @NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x0, 0x0, 0x0, {}, @NFT_OBJECT_CT_EXPECT=@NFTA_OBJ_HANDLE={0xc}}], {0x14}}, 0xec4}}, 0x0) 23:17:28 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:28 executing program 5: syz_emit_ethernet(0x1366, 0x0, 0x0) 23:17:28 executing program 0: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000006380), 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x8000000) 23:17:28 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 23:17:28 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x4, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) 23:17:28 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCGID(r0, 0x40049409, &(0x7f0000000140)=""/199) 23:17:28 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:28 executing program 5: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000140)={'batadv0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(r2, &(0x7f0000002440)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x2c, r3, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_ISOLATION_MASK={0x8}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x2c}}, 0x0) 23:17:28 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCGID(r0, 0x80004506, 0x0) 23:17:28 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x641c0000, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 23:17:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, 0x0) 23:17:28 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)={0xffffffffffffffff}, 0x4) [ 2872.760615][ T24] audit: type=1400 audit(1652311048.600:633): avc: denied { map } for pid=11269 comm="syz-executor.0" path="/dev/vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 23:17:28 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:28 executing program 5: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x24, 0x0, 0x0) 23:17:28 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 23:17:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, 0x0) 23:17:28 executing program 4: socketpair(0x1e, 0x0, 0x0, &(0x7f0000000180)) 23:17:28 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x20, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000040)) 23:17:28 executing program 5: syz_clone(0xc40a5100, 0x0, 0x77, 0x0, 0x0, 0x0) syz_clone(0x8042300, 0x0, 0x0, 0x0, 0x0, 0x0) 23:17:28 executing program 0: syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@random="51627a3b9626", @remote, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private=0xa010100, @dev}, {0x0, 0x0, 0x0, @loopback}}}}}, 0x0) 23:17:28 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, 0x0) 23:17:28 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x401c5820, &(0x7f0000000040)) 23:17:28 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, 0x0) 23:17:28 executing program 0: syz_clone(0x8042300, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)="a2") 23:17:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', 0x0}) 23:17:29 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:29 executing program 5: socketpair(0x23, 0x0, 0xa2, &(0x7f0000000000)) 23:17:29 executing program 4: socketpair(0x2, 0x0, 0x0, &(0x7f00000000c0)) 23:17:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000100)="96", 0x1, 0x20000805, 0x0, 0x0) 23:17:29 executing program 0: syz_emit_ethernet(0x30, &(0x7f0000000000)={@local, @local, @void, {@generic={0x88f7, "3b96faff3b9cb80dac0ba1413cbdb73c6dd37ab44c129412e96a0322036d3c77612a"}}}, 0x0) 23:17:29 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', 0x0}) 23:17:29 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCGID(r0, 0x80104592, &(0x7f0000000140)=""/199) 23:17:29 executing program 4: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) 23:17:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)={{0x14}, [@NFT_MSG_DELTABLE={0x18, 0x2, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_TABLE_USERDATA={0x4}]}, @NFT_MSG_DELRULE={0x14, 0x8, 0xa, 0x201}], {0x14}}, 0x54}}, 0x0) 23:17:29 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:29 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000021c0)=[{{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f00000001c0)=[@cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee00}}}], 0x20}}], 0x1, 0x0) 23:17:29 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', 0x0}) 23:17:29 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCGID(r0, 0x80004519, 0x0) 23:17:29 executing program 1: socket$isdn(0x22, 0x3, 0x20) 23:17:29 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEV(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) 23:17:29 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:29 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x0, 0x4, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) 23:17:29 executing program 0: socketpair(0x1, 0x0, 0x80, &(0x7f0000000040)) 23:17:29 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCGID(r0, 0x80044584, &(0x7f0000000140)=""/199) 23:17:29 executing program 4: syz_emit_ethernet(0x2e, &(0x7f00000000c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @icmp={{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010101, @private=0xa010100, {[@timestamp={0x44, 0x4}]}}, @echo}}}}, 0x0) 23:17:29 executing program 1: syz_open_dev$vcsa(&(0x7f00000020c0), 0x3, 0x0) syz_open_dev$vcsa(&(0x7f0000000000), 0x3ff, 0x181401) 23:17:29 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:29 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@broadcast, @local, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x2, @empty, @dev, @remote, @empty}}}}, 0x0) 23:17:29 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x0, 0x0, 0x5, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) 23:17:29 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) connect$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "afc16a35dc22d1cb077dc88e70972580bab2e7538a774edc45d2701ff2b4cf913988719fb784315259ada743e6f975b028b2292f4ef4fc27c6a70746bfcb8a", 0x3c}, 0x60) 23:17:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 23:17:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000180), 0x4) 23:17:29 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) 23:17:29 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x2, 0x0, 0x0, 0x761}]}) 23:17:29 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:29 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) syz_clone(0x641c0000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 23:17:29 executing program 5: msgsnd(0x0, &(0x7f00000000c0), 0x8, 0x0) 23:17:29 executing program 1: syz_emit_ethernet(0x9b, &(0x7f0000000ac0)=ANY=[@ANYBLOB="d1364fb31a98ffffffffffff81001f008864b5cd4a95a5"], 0x0) [ 2873.708054][ T24] audit: type=1400 audit(1652311049.550:634): avc: denied { connect } for pid=11375 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 23:17:29 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) 23:17:29 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) recvmsg$unix(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x700}, 0x0) 23:17:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}}, 0x40) 23:17:29 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:29 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000040)=""/4) 23:17:29 executing program 4: syz_emit_ethernet(0x2e, &(0x7f00000000c0)={@random="51627a3b9626", @remote, @void, {@ipv4={0x800, @igmp={{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @private=0xa010100, @dev, {[@rr={0x7, 0x3}]}}, {0x0, 0x0, 0x0, @loopback}}}}}, 0x0) 23:17:29 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @empty, 0x80, 0x20, 0x66b, 0x1}}) 23:17:29 executing program 0: io_uring_setup(0x1bba, &(0x7f00000020c0)) io_uring_setup(0x38d, &(0x7f0000002140)) 23:17:29 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x20, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x40084503, 0x0) 23:17:29 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f00000000c0)={0x0, 0x0, "0b550e", 0x26}) 23:17:29 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:29 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, 0x0, 0x0, 0x4000001, &(0x7f0000000000)=@file={0x1, './file0/../file0\x00'}, 0x6e) 23:17:29 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @empty, 0x0, 0x20, 0x66b, 0x1}}) 23:17:29 executing program 0: syz_emit_ethernet(0x22, &(0x7f00000000c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}}}}}, 0x0) 23:17:29 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCGID(r0, 0x80004518, 0x0) 23:17:29 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) recvmsg$unix(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{0x0}, {0x0}], 0x2}, 0x0) 23:17:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'erspan0\x00', 0x0}) 23:17:29 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x12) 23:17:29 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @empty, 0x0, 0x0, 0x66b, 0x1}}) 23:17:29 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCGID(r0, 0x40044591, &(0x7f0000000140)=""/199) 23:17:29 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x20}]}) 23:17:30 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@broadcast, @broadcast, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0xfffffffffffffe52, 0x0, 0x0, 0x0, 0x2, 0x0, @multicast1, @local}, {0x0, 0x0, 0x0, @multicast2, "adf16c65ca889ad20247d9484c88748bd78d3cdce293ceb783f33875183c153d914e25615e1943b8d645eb2350440c321858"}}}}}, 0x0) 23:17:30 executing program 4: syz_emit_ethernet(0xae, &(0x7f0000001300)={@broadcast, @broadcast, @val={@void}, {@ipv4={0x800, @gre={{0x16, 0x4, 0x0, 0x0, 0x9c, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @dev, {[@generic={0x0, 0x11, "caf044ba962affe6609adf4313a862"}, @timestamp_prespec={0x44, 0xc, 0x0, 0x3, 0x0, [{@remote}]}, @timestamp_addr={0x44, 0x24, 0x0, 0x1, 0x0, [{}, {@remote}, {@private}, {@empty}]}]}}}}}}, 0x0) 23:17:30 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @empty, 0x0, 0x0, 0x0, 0x1}}) 23:17:30 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x12) 23:17:30 executing program 5: syz_emit_ethernet(0x68, &(0x7f00000003c0)={@random="4f656ae392c5", @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "6fd3e7", 0x32, 0x3a, 0x0, @private0, @private1, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "5ccc1b", 0x0, 0x0, 0x0, @private1, @dev, [], "739f"}}}}}}}, 0x0) 23:17:30 executing program 0: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000006380), 0x0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000006380), 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) 23:17:30 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@broadcast, @broadcast, @void, {@ipv4={0x800, @igmp={{0x6, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @multicast1, @local}, {0x0, 0x0, 0x0, @loopback}}}}}, 0x0) 23:17:30 executing program 4: syz_emit_ethernet(0x3a, &(0x7f00000000c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @rand_addr=0x64010102, {[@noop]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 23:17:30 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @empty}}) 23:17:30 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @loopback}}) 23:17:30 executing program 0: syz_emit_ethernet(0x1366, &(0x7f00000027c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd6aa8b8e813"], 0x0) 23:17:30 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x12) 23:17:30 executing program 1: getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, 0x0, 0x0) syz_clone(0x641c0000, 0x0, 0x0, 0x0, 0x0, 0x0) 23:17:30 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x304) 23:17:30 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) accept$nfc_llcp(r0, 0x0, 0x0) 23:17:30 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCGID(r0, 0x40004580, 0x0) 23:17:30 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x641c0000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000580)={0xe, 0x18, 0xfa00, @ib_path={0x0, 0xffffffffffffffff, 0x1, 0x1, 0x400000}}, 0x20) 23:17:30 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, 0x0, 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:30 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000006380), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x44000201) 23:17:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x12, 0x8, 0x0, 0x729, 0x0, 0x1}, 0x48) 23:17:30 executing program 5: syz_emit_ethernet(0x36, &(0x7f00000001c0)={@multicast, @broadcast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x14}}}}}}, 0x0) 23:17:30 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000440)={'wg1\x00'}) [ 2874.547907][ T24] audit: type=1400 audit(1652311050.390:635): avc: denied { accept } for pid=11468 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 23:17:30 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 23:17:30 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, 0x0, 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:30 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000001400)) 23:17:30 executing program 5: syz_emit_ethernet(0x1366, &(0x7f00000027c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd6aa8b8e813302c"], 0x0) 23:17:30 executing program 4: syz_emit_ethernet(0x2e, &(0x7f00000000c0)={@random="51627a3b9626", @remote, @void, {@ipv4={0x800, @igmp={{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @private=0xa010100, @dev, {[@rr={0x7, 0x3, 0xe3}]}}, {0x12, 0x0, 0x0, @loopback}}}}}, 0x0) 23:17:30 executing program 2: syz_emit_ethernet(0x76, &(0x7f0000000440)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "1ccb8f", 0x40, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, {[@generic={0x0, 0x12, "7c6a30aa12e3ca4bfce3f94586357c81"}, @nop, @window={0x3, 0x3}, @exp_fastopen={0xfe, 0x6, 0xf989, '65'}, @exp_fastopen={0xfe, 0x7, 0xf989, "dc0dc5"}, @exp_fastopen={0xfe, 0x6, 0xf989, "5796"}]}}}}}}}}, 0x0) 23:17:30 executing program 0: inotify_add_watch(0xffffffffffffffff, 0x0, 0x200) 23:17:30 executing program 1: syz_clone(0x40002400, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) syz_open_procfs$namespace(0x0, 0x0) 23:17:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000003a40)={0x0, 0x0, &(0x7f0000003940)=[{&(0x7f0000000040)={0x10}, 0x10}], 0x1, &(0x7f0000003a00)=[@rights={{0x10}}], 0x10}, 0x0) 23:17:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) 23:17:30 executing program 2: syz_emit_ethernet(0x3a, &(0x7f00000001c0)={@multicast, @broadcast, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @rand_addr, {[@generic={0x7, 0x2}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0xf800}}}}}}, 0x0) 23:17:30 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, 0x0, 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:30 executing program 0: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) 23:17:30 executing program 4: syz_emit_ethernet(0x1366, &(0x7f00000027c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd"], 0x0) 23:17:30 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) sendto$l2tp(r0, &(0x7f00000001c0)="c6", 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @private=0xa010100}, 0x10) 23:17:30 executing program 1: syz_clone(0x40002400, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) syz_open_procfs$namespace(0x0, 0x0) 23:17:30 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) 23:17:30 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x12) 23:17:30 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) 23:17:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x19, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 23:17:30 executing program 5: socketpair(0x2, 0x5, 0x8, &(0x7f00000000c0)) 23:17:30 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, 0x0) 23:17:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0xe, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 23:17:30 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x12) 23:17:30 executing program 0: syz_emit_ethernet(0x86, &(0x7f0000000200)={@empty, @local, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "ea5021", 0x4c, 0x2f, 0x0, @empty, @local, {[@fragment={0x2e}]}}}}}, 0x0) 23:17:30 executing program 2: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000140)={'batadv0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x24, r3, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}]}, 0x24}}, 0x0) 23:17:30 executing program 4: syz_clone(0x641c0000, 0x0, 0x0, 0x0, 0x0, 0x0) 23:17:31 executing program 5: syz_io_uring_setup(0x6406, &(0x7f0000000000)={0x0, 0x33f0, 0xe}, &(0x7f0000ff9000/0x5000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 23:17:31 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x1}, 0x48) 23:17:31 executing program 0: syz_io_uring_setup(0x6406, &(0x7f0000000000)={0x0, 0x0, 0xe}, &(0x7f0000ff9000/0x5000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 23:17:31 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x12) 23:17:31 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x0) 23:17:31 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) bpf$MAP_CREATE(0x6, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000540)) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, 0x0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000080), 0x10) syz_clone(0x68001000, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) syz_clone(0x1000080, &(0x7f00000000c0)="ada623f030613ad7e71fc6978b357573135135a4261f0deb4353c375cfc943807cba85efecdcf3979e991a2fbb81d5ba32cfcc91e54f3ed772272ca013b0f61e7db7b0655511ad50ab243a7b51a91d6749ec4c2db71c08e7a89ff283895a25c39e6d3b2c5114dfaecdb796f0a91d6e98db936eea21b223243c1cad8c666f0369977dea0d671c671538e3e9ffea1758bbc730ecc098e967c83e98de6580b62234e7", 0xa1, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000180)="4a9511641481f14a1c5e8dc6b28c614340c7edcb7bfb8a01b28fea37ec1670c29975ba197c301e69ff0d8a78356b52ebb186ab6a00e2e75d04f5a0e13c9bbc299c8bb5dd79b07a0b91a2e3ded32446f293bc0da083470223f32b") ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) r0 = syz_clone(0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) syz_clone(0x641c0000, &(0x7f0000000280)="1c", 0x1, &(0x7f00000002c0), &(0x7f0000000380), &(0x7f00000005c0)="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") syz_open_procfs$namespace(r0, 0x0) syz_clone(0x20000000, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 23:17:31 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) 23:17:31 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x20, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)) 23:17:31 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCGID(r0, 0x8000451a, 0x0) 23:17:31 executing program 2: openat$vcsu(0xffffffffffffff9c, 0x0, 0x49ad80, 0x0) 23:17:31 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, 0x0, 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:31 executing program 4: syz_emit_ethernet(0xbe, &(0x7f0000000140)={@random="dbaa7da10a9f", @local, @void, {@ipv4={0x800, @udp={{0x7, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @private=0xa010101, @remote, {[@lsrr={0x83, 0x7, 0x1a, [@loopback]}]}}, {0x0, 0x0, 0x94, 0x0, @opaque="a422fff24e0677fcc05c286ede8df3684aa21b93e6b3d12e38fbf38f2db75086d0b4f31f9e46321492d3fc53865dba2b1ecf8b45961b7257aafacf71601ec3df20c94ade93c9a6b2216631add31ef52136911cc771faa9ed98ab924f11c95f68818194f7438217e5ba21a3f83621765494f1f4a5d3cbc0868126e0f84b2243da5076a85fca288b93e960ebfb"}}}}}, 0x0) 23:17:31 executing program 1: syz_emit_ethernet(0x6e, &(0x7f00000003c0)={@random="4f656ae392c5", @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "6fd3e7", 0x38, 0x3a, 0x0, @private0, @private1, {[@hopopts], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "5ccc1b", 0x0, 0x0, 0x0, @private1, @dev}}}}}}}, 0x0) 23:17:31 executing program 0: r0 = msgget(0x2, 0x0) msgsnd(r0, &(0x7f0000000000)={0x3}, 0x8, 0x0) 23:17:31 executing program 2: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0xc171a00f56079c24, 0x0, 0x0}, 0x20) 23:17:31 executing program 5: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000140)={'batadv0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x24, r3, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x24}}, 0x0) 23:17:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000001c80)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELCHAIN={0x20, 0x5, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x101, 0x0, 0x0, {}, @NFT_OBJECT_CT_EXPECT=@NFTA_OBJ_HANDLE={0xc}}], {0x14}}, 0x88}}, 0x0) 23:17:31 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, 0x0, 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:31 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000000)={0x0, 0xfffffffffffffec9, "d7368e94e4c68a78f02ff12a02d4485c70058dfaa4b949b1cd9a5ca9f7cd3277614377996450c6d92414f80e742f4d1ecf8388fb9b4f4da56676a5e6"}) 23:17:31 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000540)) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) r1 = syz_clone(0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) syz_clone(0x641c0000, 0x0, 0x0, 0x0, &(0x7f0000000380), &(0x7f00000005c0)) syz_open_procfs$namespace(r1, 0x0) syz_clone(0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 23:17:31 executing program 2: r0 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000000)) flock(r0, 0x5) 23:17:31 executing program 5: syz_emit_ethernet(0xfdef, &(0x7f0000000080)={@broadcast, @broadcast, @void, {@ipv4={0x8906, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @multicast1, @local}, {0x0, 0x0, 0x0, @loopback}}}}}, 0x0) 23:17:31 executing program 4: syz_emit_ethernet(0xc0, 0x0, 0x0) 23:17:31 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, 0x0, 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) 23:17:31 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@broadcast, @broadcast, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x2, 0x0, @multicast1, @local}, {0x0, 0x0, 0x0, @loopback}}}}}, 0x0) 23:17:31 executing program 5: syz_emit_ethernet(0x26, &(0x7f00000000c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @multicast2}, "0899f34f"}}}}, 0x0) 23:17:31 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)={0x0, 0x41, "1ee278641bdaa85d678e9ca894680d2e4311b251e3166e3a9dea0b07b1a85cf6b01e02a9bba74139f90324a164d5145f29ebdcfa16bef456c873188f288502630d"}) 23:17:31 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="020a00000500000000000000000000ff020005000080000002"], 0x28}}, 0x0) [ 2875.689812][ T24] audit: type=1400 audit(1652311051.530:636): avc: denied { lock } for pid=11590 comm="syz-executor.2" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 23:17:31 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x12) 23:17:31 executing program 5: syz_emit_ethernet(0x22, &(0x7f0000000140)={@broadcast, @broadcast, @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}}}}}, 0x0) 23:17:31 executing program 1: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='})-&.\\\'+[[\xbf,\']\x00') 23:17:31 executing program 2: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000080)) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000040)) 23:17:31 executing program 0: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000140)={'batadv0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x24, r3, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}]}, 0x24}}, 0x0) 23:17:31 executing program 4: socketpair(0x3a, 0x0, 0x0, &(0x7f0000000000)) 23:17:31 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x40086602, &(0x7f0000000040)) 23:17:31 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x12) 23:17:31 executing program 2: syz_clone(0xc40a5100, 0x0, 0x77, 0x0, 0x0, 0x0) syz_clone(0x8042300, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)="a2") 23:17:31 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000240)=ANY=[], 0x0) 23:17:31 executing program 4: syz_emit_ethernet(0x5e, &(0x7f0000000440)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "1ccb8f", 0x28, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@generic={0x0, 0x11, "7c6a30aa12e3ca4bfce3f94586357c"}]}}}}}}}}, 0x0) 23:17:31 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@broadcast, @broadcast, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @multicast1, @local}, {0x0, 0x0, 0x0, @loopback}}}}}, 0x0) 23:17:31 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x12) 23:17:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000003a40)={0x0, 0x0, &(0x7f0000003940)=[{0x0}, {0x0, 0xc0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 23:17:31 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000040), 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x11, 0x0, 0x0, 0x0}, 0x20) 23:17:31 executing program 4: syz_emit_ethernet(0x5e, &(0x7f0000000440)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "1ccb8f", 0x28, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@generic={0x0, 0x11, "7c6a30aa12e3ca4bfce3f94586357c"}]}}}}}}}}, 0x0) 23:17:31 executing program 2: mincore(&(0x7f0000ff4000/0xc000)=nil, 0xc000, &(0x7f0000000000)=""/215) 23:17:32 executing program 5: socketpair(0xa, 0x2, 0x0, &(0x7f00000000c0)) 23:17:32 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCGID(r0, 0x8000450a, 0x0) 23:17:32 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 23:17:32 executing program 0: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x80) 23:17:32 executing program 4: syz_emit_ethernet(0x5e, &(0x7f0000000440)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "1ccb8f", 0x28, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@generic={0x0, 0x11, "7c6a30aa12e3ca4bfce3f94586357c"}]}}}}}}}}, 0x0) 23:17:32 executing program 2: socket(0xa, 0x0, 0x7ff) 23:17:32 executing program 5: sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x7000) 23:17:32 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x5}]}) 23:17:32 executing program 0: syz_clone(0x13281000, 0x0, 0x0, 0x0, 0x0, 0x0) 23:17:32 executing program 4: syz_emit_ethernet(0x5e, &(0x7f0000000440)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "1ccb8f", 0x28, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@generic={0x0, 0x11, "7c6a30aa12e3ca4bfce3f94586357c"}]}}}}}}}}, 0x0) 23:17:32 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 23:17:32 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 23:17:32 executing program 5: setresgid(0xffffffffffffffff, 0xee01, 0xee00) 23:17:32 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000006380), 0x0, 0x0) flock(r0, 0x0) 23:17:32 executing program 0: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000006380), 0x0, 0x0) flock(r0, 0x8) 23:17:32 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 23:17:32 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x80, 0x6, 0x6, 0x9, 0x0, 0x1, 0x20, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1089, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x5a, 0xff, 0x77, 0x0, 0x0, 0x4280, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x4, 0xc00000, 0x800, 0x9, 0xffff, 0xfffd, 0xc9, 0x0, 0x7, 0x0, 0x5}, r1, 0xa, 0xffffffffffffffff, 0x2) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 23:17:32 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8010}, 0x24000000) 23:17:32 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCGID(r0, 0x40084504, 0x0) 23:17:32 executing program 1: msgsnd(0x0, &(0x7f0000000180)={0x2}, 0x8, 0x0) 23:17:32 executing program 0: syz_emit_ethernet(0x36, &(0x7f00000000c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}, "72af9bbfd1c8e363a1eb2466a1fbee537ba85207"}}}}, 0x0) 23:17:32 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 23:17:32 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000580)={&(0x7f0000000400), 0xc, &(0x7f0000000500)={0x0}}, 0x0) 23:17:32 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000029c0)='ns/pid\x00') 23:17:32 executing program 3: syz_emit_ethernet(0x36, &(0x7f00000001c0)={@multicast, @broadcast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x4, 0x0, @empty}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 23:17:32 executing program 1: syz_clone(0x24000200, 0x0, 0x0, 0x0, 0x0, 0x0) 23:17:32 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 23:17:32 executing program 0: syz_emit_ethernet(0x4e, &(0x7f0000000040)={@multicast, @remote, @void, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "cd26b9", 0x18, 0x21, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}, @dev={0xfe, 0x80, '\x00', 0xe}, {[@dstopts], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "893626", 0x0, "8a2ef5"}}}}}}}, 0x0) 23:17:32 executing program 2: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000003500)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00p'], 0x104}], 0x1}, 0x0) 23:17:32 executing program 5: bpf$MAP_CREATE(0x6, &(0x7f0000000200), 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000540)) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, 0x0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000080), 0x10) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x641c0000, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000380), &(0x7f00000005c0)="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") syz_open_procfs$namespace(r0, 0x0) syz_clone(0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 23:17:32 executing program 3: syz_open_dev$vcsa(&(0x7f00000000c0), 0x0, 0x0) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4) 23:17:32 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000180)={0x0, 0xff00, "d7"}) 23:17:32 executing program 0: socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) 23:17:32 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000440)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "1ccb8f", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 23:17:32 executing program 2: syz_emit_ethernet(0x5e, &(0x7f0000000440)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "1ccb8f", 0x28, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@generic={0x0, 0xa, "7c6a30aa12e3ca4b"}, @window={0x3, 0x3}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 23:17:32 executing program 3: syz_emit_ethernet(0x36, &(0x7f00000001c0)={@multicast, @broadcast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x700}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}, 0x0) 23:17:32 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000140)={@random="dbaa7da10a9f", @local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @private=0xa010101, @remote}, {0x0, 0x0, 0x8}}}}}, 0x0) 23:17:32 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000180)={0x0, 0xff00, "d7"}) 23:17:32 executing program 4: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000003500)={0x0, 0x0, &(0x7f0000000500)=[{0x0}, {&(0x7f00000006c0)={0x10}, 0x10}], 0x2}, 0x0) 23:17:32 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x2, 0xa, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in6=@private1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x38}}, 0x0) 23:17:32 executing program 2: r0 = socket(0x2, 0x3, 0x4e) recvmsg$unix(r0, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0xe0}, 0x0) 23:17:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r0) 23:17:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000180)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)={0x2c, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}], @NL80211_ATTR_DURATION={0x8, 0x57, 0x80}]}, 0x2c}}, 0x0) 23:17:32 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x641c0000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 23:17:32 executing program 4: syz_emit_ethernet(0xe, &(0x7f0000000340)={@dev, @remote, @void, {@generic={0x88a8}}}, 0x0) 23:17:32 executing program 0: remap_file_pages(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x8, 0x0, 0x0) 23:17:32 executing program 3: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x8000000) 23:17:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'tunl0\x00', &(0x7f0000000040)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @dev}}}}) 23:17:32 executing program 5: r0 = openat$vcsu(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) execveat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 23:17:32 executing program 0: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) 23:17:32 executing program 1: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r0, &(0x7f0000000080)='id_legacy\x00', &(0x7f00000000c0)={'syz', 0x1}, 0xfffffffffffffff8) [ 2877.031301][T11745] mmap: syz-executor.0 (11745) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 23:17:32 executing program 3: add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc2}, &(0x7f0000000200)={0x0, "a6e0f715536d7cc277168b8ce457337133ee4c4baeb43bc36fc92a0feb0b0737ed6ad79bf7eed7dcbc87681092824df7e9aa63760b54e958008b2fcf2797d4f0"}, 0x48, 0xffffffffffffffff) 23:17:33 executing program 2: r0 = openat$vcsu(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) getdents64(r0, 0x0, 0x0) 23:17:33 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f00000000c0)='@(}\'\x00') 23:17:33 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x3, &(0x7f0000000540)=@framed, &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:17:33 executing program 0: migrate_pages(0x0, 0x3, &(0x7f0000000b40)=0xb5, &(0x7f0000000b80)=0x6) 23:17:33 executing program 1: remap_file_pages(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) 23:17:33 executing program 3: syz_io_uring_setup(0x7a0e, &(0x7f0000000480)={0x0, 0x8410, 0x9}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000500), &(0x7f0000000880)) 23:17:33 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 23:17:33 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100024, &(0x7f00000001c0)) 23:17:33 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1382063, &(0x7f0000000080)={[{@mode}]}) 23:17:33 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)) renameat(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00') 23:17:33 executing program 3: io_uring_setup(0x4b91, &(0x7f0000000040)={0x0, 0x0, 0x16}) 23:17:33 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40047211, &(0x7f0000000080)={0x10001}) 23:17:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1555555555555595, &(0x7f00000001c0)=[{&(0x7f0000000380)="a4bbce60f1ac6cf43ab05d763ee523e4e9dc6ab88aa5217a13d4bcfb17659cfa8599a53bec7706a9c3b076db71fae362f8312adab8e87f30224a182dd41b1bc6cdb7b7d5db7b904f21b874ea43319d5176df1158fff258afb4ac6b53", 0x5c, 0x800}, {&(0x7f0000000100)}, {&(0x7f00000002c0)="16f0c9cba39ad1fca07f64e68444e95f93bce44a479274634b0306f3986085471221fd83305390dd8a1c6f7003a893e70c1e9b9b7fa4962521f0d0eb8441cb743182c5d1a3a880c8f4b4b85a4df09bd1f5a81bfe4d7356d92a83465400503df789d965865d93db76320cef560d9dbd8568522863a958249f63a5b3a97dfe7178d27ec0c55b1268bced157295836e616edc3a0b086ba4daa4347b14d418941d46c77f00b3e78dc473d40d7e53eda62159e3858a550cdf62f304e9dfa5", 0xbc, 0x9}], 0x9000, &(0x7f00000006c0)={[{@utf8}, {@numtail}, {@uni_xlate}, {@shortname_lower}, {@shortname_mixed}, {@iocharset={'iocharset', 0x3d, 'maccroatian'}}, {@shortname_winnt}], [{@uid_gt={'uid>', 0xee00}}, {@appraise_type}, {@obj_user={'obj_user', 0x3d, 'size'}}, {@dont_hash}, {@appraise}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_hash}, {@obj_user={'obj_user', 0x3d, 'size'}}, {@appraise}]}) 23:17:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000040)) 23:17:33 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[]) execveat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x1000) 23:17:33 executing program 4: waitid(0x0, 0xffffffffffffffff, &(0x7f0000000040), 0x2, &(0x7f00000000c0)) 23:17:33 executing program 5: openat$vcs(0xffffff9c, &(0x7f00000013c0), 0x0, 0x0) pselect6(0x40, &(0x7f0000001100), &(0x7f0000001140)={0x9}, 0x0, 0x0, 0x0) [ 2877.932402][ T24] audit: type=1400 audit(1652311053.770:637): avc: denied { mount } for pid=11773 comm="syz-executor.4" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 2877.942283][T11782] tmpfs: Unknown parameter 'errors' [ 2877.954884][ T24] audit: type=1400 audit(1652311053.770:638): avc: denied { remount } for pid=11773 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 23:17:33 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40047211, &(0x7f0000000080)={0x10001}) [ 2877.996692][ T24] audit: type=1400 audit(1652311053.840:639): avc: denied { unmount } for pid=9895 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 2878.032105][T11785] loop2: detected capacity change from 0 to 264192 23:17:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f00000005c0)={[{}]}) 23:17:33 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000001740)={[{@fat=@dos1xfloppy}]}) 23:17:33 executing program 4: openat$random(0xffffff9c, &(0x7f0000001280), 0x0, 0x0) pselect6(0x40, &(0x7f0000001100), &(0x7f0000001140)={0x9}, 0x0, 0x0, 0x0) 23:17:34 executing program 5: request_key(&(0x7f0000000340)='logon\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='fscrypt:', 0x0) 23:17:34 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0) 23:17:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') getdents64(r0, &(0x7f0000000800)=""/100, 0x18) getdents64(r0, &(0x7f0000000180)=""/196, 0xc4) [ 2878.218850][T11799] FAT-fs (loop3): bogus number of reserved sectors [ 2878.225416][T11799] FAT-fs (loop3): Can't find a valid FAT filesystem [ 2878.242666][T11803] loop2: detected capacity change from 0 to 264192 23:17:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x8000, &(0x7f0000000380)) 23:17:34 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40047211, &(0x7f0000000080)={0x10001}) 23:17:34 executing program 0: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ptrace(0x10, r0) ptrace$setopts(0x420f, r0, 0x0, 0x0) 23:17:34 executing program 1: clock_nanosleep(0x2, 0x0, &(0x7f0000000400), 0x0) 23:17:34 executing program 5: migrate_pages(0x0, 0x7, &(0x7f0000000040)=0xffffffff, &(0x7f0000000080)=0x3) 23:17:34 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x0, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x10) r1 = syz_io_uring_setup(0x88, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x3000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000340)=0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_CLOSE, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r4, 0x0}, 0xa66) io_uring_enter(r1, 0x4508, 0x0, 0x0, 0x0, 0x0) 23:17:34 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840), 0x0, &(0x7f0000000a40)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_L}]}}) 23:17:34 executing program 4: r0 = openat$vcsu(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) 23:17:34 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000001780)=[{&(0x7f0000000680)="bc68375e30ad826827d3acfc047b117ca1199c98b82e516ec5f8d75cef00d52b371e427f0c3a3d6c07b0430d036b20046f7a8d40214eff548b811815dafd883b072c02b32dd4a2e302f136d29ba2118da1b855c8b2c46cc72af3992d14338a83c6294179a2e21a1a13e6499e15aa03e3168d296d590a6af1ff8010424ba5a802703c81e58d9d793041b362cfcdba2667fa7db81ec7d2194bb0124cb3066a346fe6cb65fe039e30de621980078af05b2eb473ac948b68e8361d162c2d5e449f480df46297c5b18d5066425e99313f3f5ddafd421a23ba8ccc9c9cf18ee0b2badd78bfc8cbef5d6c8a662e89a81331005d9acf60fafdbe4e8199a43ae741cf9657a6798f941f38de47300c24e546c378493f1a95c41b138a0b4991be9b61514de969afab2fa1b49ca8692440fbd2cf3095a4fdba50179cd6dd1ee4811562ab850909e5467ed59df7d1da0c598683728e66f4d987a4858facabadaf7be56d2c49ccb42ce66967b3410f0a7195b1a768a78bafa7942024fc0ae95d84fe246cb080a31e3422e6f2eb3180b45628c132c09e2ccf290f858ffdc7a5af72ab5ee0a345d3b9aa4e07d051954f674ad3bebf49e8fadac8d2668f6aa5ddb44ff77ed8b2c197860a41735c00292953cb2a4e972526651a6bc972b072fe49ca7a2698d67afb7cc09c5330edcbcd4d0add00a20a7a0ff81e9a95c6d20947e4aa5fb724bb6e005ce68a84368555007fc81d347338bc5a6ce79e800377cc0ca5fef3e847beb64f49865c9b5db2d8456923cd1db4dfe89e71a27f03fe2bdfff68a0df82dbfa63255c8e1db38e30dbe64e778b0a8395216f051200b3ff4f9ae42253518d1811e9fe4bce2b38b85107f7d47f5aab80617fa8ebe550c49e97b8220707e1cd84b27d94dea9f127a05a6168129aa092018f8db5f01dac754334f240bc02cd6b03bebafca658d1dc3c5a31e0ca97e6444600f230e78b0e7301cc3d18bf420177e7f249ccae231c417549a985b8c4fded0c28db95d724af779b7dc6f229aa630d76f33f2797a29b50571029a23ffc2c4af453fce2f6fa78bb1a0206177d5f5691070d3feaf6c48499996502e7a9fe2b674115169cb5d0931e0f9f6e8c1e96f54a93b7d70467614a3645b5041c73e85d8c1987fe132a46c876bf173ea5e105155bfe6799c617306a4af25b976a65972a88960cfbc0bf2cef17b14c7f5c7ff2b2724c522b79167ea194d3372de2142e7837d4db89323d6563f053cbdb1240653df50dd1ae69119a907f665234618b2b48dda054e21238db64423f3c303f87f61bb5f5ad1596bed5642b4be02cc31ac85c53ee754d20f07fe07562cc07dd8e7913ccb2724abee4147277dbb40d4c2230d8b21f5099d47b55b73c65715492e23dc32159bda87fb40c46956a87ae47a67fd2253f36926cf6c0b120df54d7cf52b2a78a2a9799cf9ba0497f8c6b98567fc832145050f53ac5be96eb29030ae09bf9f6a93ff3d6ae22c011067a10c998dfe9c143e2b8de3d1ed22abde7b7b34ee6ed0ff66294837ad4c699f8638ae48bafbf06b866787792e5b2c6311dfba37c14c54e4e43040d57a749b0269d064cff259c2725ab08ac9861b4fea50b9f44d2e10717bff68a2bd2b89a01c0a22c1044360e83f2d5f670200b919e8eab46529d026aad24d704793fa1568ff2721a227eb712019e4a171d1aa8bf89637ae5c54e166c567464d77498ee1cb799c769c4db5ce825932d311b35a435d9100f94d7145404fe5d659ce5787e6d7d5796c7da672c83d0c5b0e673989d61828ac95cc76a4974ead6e4fa3238c5c89dee7a1135a26738f6ee8a1dc7805baa144a4cc984579980401a069a1da45de1000c34d289c3a599e603d21b89aed3d138ad844102f24243f7373622e075dfb92281cd115af34b133803495f7779744c82b4fb6aa262eb05510dc5a6636d56694b5f9720e34d7b402c8f645aa0c3273b68bfc50c926a961ae7badd820d13f9abeb445a10bcb7ba3e943046f49e55198110c0d7e1d1f24a4c6a815a6fbc875176dc90ea42b0b7342cf24331d3c5386b916d403ef276a27169854df1769033984a545c9ba7c7da7c8ea32a4fee0ab2fe520c0b64a27c04409ade3265dc9a2dd034b53f6343f562409ce19fb148af1e54e2b0bc94c606615e4839c672c57c326e018ccd6bf51fe233a5c7d94c311b22b8a63dffbb81eec31b7a05a860d5dbac94cd21efff5916a78771335f6b9f6f99f9141d667d89656c0168ba40c07b9a3dbb1966a2343288a9711569376ec88ed73691da02d6a5e0aca5f39d629ae22f131abecc0f2093c0212a1e1aa15ebae0282ced557563a2017f4671ea6c833a08c3833941e3cf8ea47254585ec972bcbf2be62469d2fc0d5fa2a5c935f7c5c96f721bb379744abc6d80b25004d0fad101a13917a7f98c8dbfc57d827b36483e2a6c821cb70b478bf19c3f988f30569d0ff2e897ef5ffbe07aa9e2934e99b57ac0c34cff13af3775e7b213c38db429d5fda6be6ec36086b5e1f7cdeec0b9a32a885074e3d523d6b645bd735fe784dd8fe025f1f76506b33044364e89192cb1c1ca0a3f703f04687f5d4bac410e32d97b0a80e16dde3183d66e6aac86cf98fc5017ed06776cb42e57f192f0d22d6b273314389e3da430fffc9dd21e5bec4d31a001539fd38055130b4748e59be1287f61638abe2e0818d8a5ea5aa16b39203c7b5f3e092cfa8a47ec66a7182d74bc870de9db94bce6c624d280e7b64b8f95eb52329fe508a536e35601aab5ddcd7e563d42e4bf9e6875deed1e5886035ec9775d3f580b85773f1a6fda3a06a912df91e80252a7eadb7c17daf688b726526db263b1099dd3dc4970b79735e776c4958e53cfda445dbfeb91096731ff7d45e723e55d4e1c9affada3366d1524bf31f28c6863f3e2e22414154d59b627f9add8fa6ec3796f455301ad7b0bc0c5f1b4691abb73c85c4c7ba3a7e4849ee58b74740f74a9dbb497ad41747938ae078e2580e1ab6f6bd0b633017b35b94fdb2998a031a36582392a0b10261fded177e535387f4cc3b9fadcd23bd702ce63c3eb4442fd5b0ef758df1e0772ee4c72ccd4caa4c0ab14595327927713ad59670fd26d3438224aa4f5fb5e1bf8ad7cf2fc1f82fe5e7a296930c00b7bdcc403a69d5340676185515ca28bad88089f0e4977a0a5bd8458856b4660fadae11cee21abf015961a9aac868be9cdab0bbc4c4ae015f0c52a728f982d07a5d857cf5a3dff1c6d8a5efec6eb8dbdd10aa7fe8a1a82034e3fb925879766c4948b3b62fcea989ff67930b7d5e51099ed6b9f07e9984fb62903760a60ab115fa54fe12724ed54148b69e3db7ec0c76ffbb3188f979762723f9d4a0c1a674977f733f65671059cc847c8ab69fce34fa5da09b8c0f22daec3ad753011c9577a9f31bf416a552d5b9112e6f94956032939e13aba344d7ba5d11d1ebe08dbf0653610a2dde059f9f89b6dc7f5d8981bd0bfdbc0cf044049393d3e94684c5ae9e19a2c5d1796809a4ee86db39e5fcec93cb1151e86240ce8427f7cc0c9c5100f8baaa4862ef3f9afb4b0c1e139e3968e9840eb42c747c3064e20ad9da30376404271b0f27e8ca3039570abdc185c1175a1d23d892e587a101bcc9bc4c7a1e2858af533aff7c656101de1ccc59cf87e931dde03aefb169d0294ab7e876233097dd0eb160545968fa0bfa224dc672813fe7feda91607795c0c6419a91abcb3b6c31d875b8cbd80c19614a75a6382a75b370148259b6a636c95c5cebad4310e5ddec573baef5611771a265c9ca8e3f38b389dcea0de3a4c2b1b1f0ffa2da16d11b34fa5dd891f3ed3330619462d9267e390871377851b168f60871d1b4e72644469d203c156f588531c72d1dd6f38cecf9414edaa537cf667f7808321ec006219c8a50eecec205587cfd387c1791cd7bd69eea9b216757a65c5847f54818c4d3ce9b52ab8fef021aed3d9bb55e5bfeea76b3ca18da8a0fb7e9f22176e095642c54235ac4e1a4e31ff18635b33fd4a19fe8511377e3b4f050fceb1c29e511d2164c4f417b9e5cbe93749f3a94299220eb994679e9721c192e06fb5af674e4ef6c0400525c500e562b65b29d2a30818839f4480ee91028b479a439a63e613890a3fc2fb96d460fe664d0535bc48eb8c06f46d78b3df5af63faac6d14f5f12b2449f9c98431e81065f3a802faa79de09202dd9234b58f618b7d635a646b6903aadce2c087f476edb8d1c2c29cfe6c7b86f47940eac0d7917e8b502df20470d810126493445acebbed223c38993691a35576543018749a7216ed12ca1f1a57f81f7c7229fff4b90f7ce745e61f146495a25690ca991eb8703316ae8101750bd321ad7890669ffa43f2095cd888fcb0d69240b02f34acad53e5a1a4297df1cfcc25b28892fb5bdac2e48b5c47e72a4d734b4b0fc05df5a802c8ef08569a047e59d984ffb06179016ae649576df618b7faa606b621243aef3595f72d227c5966ba9fb08293ab49e88c8e258b8246729830c079d5ca0ff44cf769b69e2b0b444aa1e9584c4598eb825f086df6969f52cc63bc5421e89415925fa626b9e99d8c53692bfe34a607ed81576da4eebdc00a9383895e5d0752d1ab1d14723e1fae3a417d5154d0d07c99c638b8e03dc5f7bc82b010c3ac318d424e738e9ee42d284c00b88470bb5e8df1168e6f4a1d846e81f38e764884e36168567a6872ffb7c7d40b9ae9e8e3c0f6ae8e110574dddbaee87888c01afec77b1bc7c9ba7181650a97bcb6f82ecb110e037eb2ac62aeeca595938d47fc41733e2cc3327940e3a43d3f43025709d6627bdde4ba1db62ca41be8607d344048c9c94c031112c04b88d4d6ae2c270a3a10e615dfc255977d62e5bc2e084a8801960b8efed8ed8b0097bc2b847a470cc92745ae40fb9aee55c8cf24d66b9d82aeb62f1b079b8d0f59519d0437bbdfc0647434e423f88b1be94703de0ddb931046439f281635d111de84ec31433437758e0664a8e18181f4c589d43ce301eca82c5c0e72393a33555d42bbe8e7b6fa0a8d20736552a46726a1ded4b62ca2bb5212e0041d52a20bc2a481efc7859e6b69190cd7d8461f5c3b358ca6244f828f5329de91de4ffcac65a2cfe01fc0889b24be331249d7a4ebf6aa2a9b9c4b123d5c5ee395a87595afcf3cce06fd9db309ba263167f72c4019bf36f2c8a1d4f568f7d46f71345e17c0cc472e2917cb821abce0af59c38ff51a7f98c48585ad406cd7297ecd8369b573f9c0fb54a57853cac31b0cf1e651e36449c2e7c1f9aedfb556dd171ceda119eaa334efdd3d8eafe09d33102f3075ede4d47d5f6a550eedc295e188af1429b9ffa83e65a06a88ad8c15a3e18d77b4945b5c9424f7746203ae1d4f9e0ab1905b48101fd0ce2eeedc6a38edc54780c1319839fbec95785c940b2be3114605c508db11003f6b282f48a0e0082add8574b046ea70749c835b1efcb8607bee82e56a918a4ae3b6e7a1a0e76033a6685806f8dcda2b9a7c62dfd14c47663b7560bd5643c013d266ac44cf92e8aaecd4ac36e4efcd439b4ffa8c040b8ead87a9ce7194b30976fec6c43cbede4cb8db1dff55538c9ea7e61691909bad19746bbb218d4a76abd4a36c324ca57f27e837824c46161822e66680f822b0500c365929c518db3447edf027150bf5d98bb948f4f197cec0074750d83daac2f029570c5c224198be306d4226187135f7fca6c79e7ee67f517d1b1411de72d3259dbbbf707c40922f5bf440408bfeb9106734853c5bbd3b399de8df05a48a7c5f18ef1cd", 0x1000, 0x1}], 0x9028, &(0x7f0000001800)) 23:17:34 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40047211, &(0x7f0000000080)={0x10001}) 23:17:34 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000280)='kvm_userspace_exit\x00', r0}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x22, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0xc2, 0x0, 0x0, 0x0, {[@exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) [ 2878.983638][T11818] loop2: detected capacity change from 0 to 264192 23:17:34 executing program 1: sigaltstack(&(0x7f0000ffa000)={0x0}, 0x0) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x64) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffd000/0x2000)=nil) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) 23:17:34 executing program 4: futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{}, {0x0, 0x2710}}) 23:17:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4c, &(0x7f0000000380)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "070902", 0x16, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}, {"a833"}}}}}}}, 0x0) 23:17:34 executing program 3: get_mempolicy(0x0, &(0x7f0000000140), 0x0, &(0x7f0000ffc000/0x4000)=nil, 0x3) [ 2879.094071][T11827] 9pnet_fd: Insufficient options for proto=fd [ 2879.112704][T11829] loop5: detected capacity change from 0 to 8 23:17:35 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[]) execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x1000) 23:17:35 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000800)={0xf, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x99, &(0x7f0000000380)=""/153, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:17:35 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000b24000/0x4000)=nil, 0x4000, 0x3, 0x8010, 0xffffffffffffffff, 0x25d38000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000300)='dctcp\x00', 0x6) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7}, {0xc, 0x2, [@TCA_FQ_CE_THRESHOLD={0x8}]}}]}, 0x38}}, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) r5 = syz_open_dev$vcsn(&(0x7f0000000180), 0x5350, 0x880) recvfrom$inet6(r5, &(0x7f0000000400)=""/232, 0xe8, 0x100, &(0x7f00000001c0)={0xa, 0x4e23, 0x100, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x6080}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4) splice(r1, 0x0, r0, 0x0, 0x406f408, 0x0) 23:17:35 executing program 4: r0 = openat$rtc(0xffffff9c, &(0x7f0000004bc0), 0x0, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) ioctl$RTC_VL_READ(r0, 0x80047013, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@huge_advise}, {@huge_always}]}) [ 2879.145776][ T6747] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2879.177479][T11835] loop2: detected capacity change from 0 to 264192 23:17:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_int(r0, 0x1, 0x28, 0x0, &(0x7f0000000140)) 23:17:35 executing program 3: pipe2$9p(&(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000500)={0x0, 0xffffffffffffffff}) 23:17:35 executing program 5: clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, r0+10000000}, 0x0) 23:17:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f00000005c0)={[{@fat=@showexec}]}) 23:17:35 executing program 4: timer_create(0x0, &(0x7f0000000480)={0x0, 0x0, 0x8, @thr={0x0, 0x0}}, 0x0) 23:17:35 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x7fffffff}]) 23:17:35 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = syz_io_uring_setup(0x88, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x3000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, r4}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r3, 0x0}, 0xa66) io_uring_enter(r0, 0x4508, 0x0, 0x0, 0x0, 0x0) 23:17:35 executing program 2: syz_io_uring_setup(0x1d7d, &(0x7f0000000000)={0x0, 0x0, 0x1}, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 23:17:35 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket(0x0, 0x80d, 0x0) getsockname$packet(r1, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="4001000024000b0f00e40000a0cfffff01f10feb", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000f6090001006e6574656d00000010010200ca020000b0"], 0x140}}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x14e24, 0x0, @empty}, 0x1c) r5 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r5, {r2}}, './file0\x00'}) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0xff030000) 23:17:35 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 23:17:35 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000001740)={&(0x7f0000000000)={0xa, 0x4e24, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000001880)=[@hopopts={{0x14, 0x29, 0x3b}}], 0x14}, 0x0) 23:17:35 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)) openat$incfs(r0, &(0x7f0000000000)='.pending_reads\x00', 0x40, 0x0) 23:17:35 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[]) openat$incfs(r0, &(0x7f0000000000)='.log\x00', 0x0, 0x0) 23:17:35 executing program 3: r0 = openat$random(0xffffff9c, &(0x7f0000001280), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000014c0)=ANY=[@ANYBLOB="0080"]) 23:17:35 executing program 5: r0 = openat$rtc(0xffffff9c, &(0x7f0000004bc0), 0x0, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) 23:17:35 executing program 0: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001e00)={0x6, 0x3, &(0x7f0000001bc0)=@framed, &(0x7f0000001c80)='GPL\x00', 0x5, 0x93, &(0x7f0000001cc0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r0, 0x0, 0x0}, 0x10) 23:17:35 executing program 2: syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@mpol={'mpol', 0x3d, {'default', '=static'}}}]}) 23:17:35 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 23:17:35 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x155555555555575e, &(0x7f0000000180)=[{&(0x7f0000000080)="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", 0x0, 0x5}, {&(0x7f0000000200)="9c9054cf97650ecd8c72a4f61e592a7f19eb694c4fcfb2843333aa3cce277d16b069d6c0814effa56b93f5a251425421ae8393c3075a4f74a9fe6e108a4a836d52f3c004f3823445c1b433d076d8a5f705b5b3a57e508527af45e1c9a32445a191dae317b8c1e552ab7f12a0428c811d631a5f3d3c5a3b6183f161c07a4b0a1d2cd07f90cdf09ec0", 0x0, 0x111cbe87}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="646d6f6465cb66cc663ad1a183423d3078303030303030303030303030303030302c6869641b6fcbba7c06652c6d61703d6b3d5e6287"]) [ 2879.585896][T11867] netlink: 244 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2879.596626][ T24] audit: type=1400 audit(1652311055.440:640): avc: denied { name_bind } for pid=11866 comm="syz-executor.1" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 23:17:35 executing program 0: r0 = openat$rtc(0xffffff9c, &(0x7f0000004bc0), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 23:17:35 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket(0x0, 0x80d, 0x0) getsockname$packet(r1, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="4001000024000b0f00e40000a0cfffff01f10feb", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000f6090001006e6574656d00000010010200ca020000b0"], 0x140}}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x14e24, 0x0, @empty}, 0x1c) r5 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r5, {r2}}, './file0\x00'}) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0xff030000) 23:17:35 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@nr_blocks={'nr_blocks', 0x3d, [0x65]}}]}) 23:17:35 executing program 5: syz_io_uring_setup(0x0, &(0x7f0000000300), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x0, 0x0) [ 2879.712579][T11884] tmpfs: Bad value for 'mpol' 23:17:35 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000380)) 23:17:35 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 23:17:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0x0, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 23:17:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x3, &(0x7f00000001c0)=[{0x5}, {}, {}]}) 23:17:35 executing program 0: r0 = gettid() r1 = gettid() kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, 0x0) [ 2879.946704][T11893] netlink: 244 bytes leftover after parsing attributes in process `syz-executor.1'. 23:17:35 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket(0x11, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 23:17:35 executing program 2: getresuid(&(0x7f00000025c0), &(0x7f0000002600), &(0x7f0000002640)) 23:17:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') writev(r0, &(0x7f0000000000)=[{&(0x7f0000000280)}], 0x1) getdents64(r0, &(0x7f0000000800)=""/100, 0x64) getdents64(r0, &(0x7f0000000180)=""/196, 0xc4) 23:17:36 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x400300, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe54, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{}, {}]}}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) 23:17:36 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 23:17:36 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket(0x0, 0x80d, 0x0) getsockname$packet(r1, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="4001000024000b0f00e40000a0cfffff01f10feb", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000f6090001006e6574656d00000010010200ca020000b0"], 0x140}}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x14e24, 0x0, @empty}, 0x1c) r5 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r5, {r2}}, './file0\x00'}) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0xff030000) 23:17:36 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = syz_io_uring_setup(0x88, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x3000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, r3}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0xa66) io_uring_enter(r0, 0x4508, 0x0, 0x0, 0x0, 0x0) 23:17:36 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@nr_inodes}]}) 23:17:36 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x400300, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe54, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{}, {}]}}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) 23:17:36 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000080)='logon\x00', &(0x7f00000000c0)='@(}\'\x00') 23:17:36 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = syz_io_uring_setup(0x88, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x3000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_CLOSE={0x13, 0x2}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r3, 0x0}, 0xa66) io_uring_enter(r0, 0x4508, 0x0, 0x0, 0x0, 0x0) [ 2880.650224][T11921] tmpfs: Bad value for 'nr_inodes' 23:17:36 executing program 3: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) 23:17:36 executing program 2: syz_open_dev$rtc(&(0x7f00000001c0), 0x0, 0x181000) 23:17:36 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x400300, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe54, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{}, {}]}}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) 23:17:36 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x200}, 0x80, 0x0}, 0x0) 23:17:36 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = syz_io_uring_setup(0x88, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x3000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000001c0)=0x317f, 0x0, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, r4}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r3, 0x0}, 0xa66) io_uring_enter(r0, 0x4508, 0x0, 0x0, 0x0, 0x0) [ 2880.802208][T11919] netlink: 244 bytes leftover after parsing attributes in process `syz-executor.1'. 23:17:36 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000080)=0xffff0000, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:36 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) 23:17:36 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket(0x0, 0x80d, 0x0) getsockname$packet(r1, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="4001000024000b0f00e40000a0cfffff01f10feb", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000f6090001006e6574656d00000010010200ca020000b0"], 0x140}}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x14e24, 0x0, @empty}, 0x1c) r5 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r5, {r2}}, './file0\x00'}) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0xff030000) 23:17:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x8, 0x2, &(0x7f0000000080)=@raw=[@map_idx], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:17:36 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x400300, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe54, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{}, {}]}}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) 23:17:36 executing program 5: get_mempolicy(0x0, &(0x7f0000000140), 0x1, &(0x7f0000ffc000/0x4000)=nil, 0x0) 23:17:36 executing program 3: timer_gettime(0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x0, 0x3, &(0x7f0000001780)=[{&(0x7f0000000680)="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", 0x1000, 0x1}, {&(0x7f00000003c0), 0x0, 0x1}, {&(0x7f00000005c0), 0x0, 0x80000001}], 0x9028, &(0x7f0000001800)={[{@huge_never}, {@huge_never}, {@huge_never}, {@size={'size', 0x3d, [0x32, 0x78, 0x34, 0x35, 0x74, 0x30, 0x33]}}, {@mode={'mode', 0x3d, 0x2}}], [{@hash}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x65, 0x62, 0x30, 0x36, 0x30, 0x34, 0x39], 0x2d, [0x62, 0x52, 0x30, 0x37], 0x2d, [0x0, 0x0, 0x31, 0x66], 0x2d, [0x32, 0x39, 0x35, 0x39], 0x2d, [0x36, 0x66, 0x66, 0x31, 0x34, 0x34, 0x61, 0x63]}}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x64, 0x0, 0x35, 0x0, 0x36, 0x0, 0x33], 0x2d, [0x0, 0x4, 0x37, 0x39], 0x2d, [0x0, 0x63, 0x35, 0x65], 0x2d, [0x39, 0x34, 0x64, 0x62], 0x2d, [0x39, 0x0, 0x36, 0x63, 0x63, 0x34, 0x33, 0x1c]}}}]}) 23:17:36 executing program 4: r0 = gettid() r1 = gettid() kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 23:17:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000880)={0x24, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x4}]}, 0x24}}, 0x0) 23:17:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000fc0), 0x1cae00, 0x0) 23:17:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000f80)={&(0x7f0000000e40), 0xc, &(0x7f0000000f40)={0x0}}, 0x0) 23:17:36 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0x1a, 0x0, 0x0) 23:17:36 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000007a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000005600)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xffffffffffffffff}}}], 0x20}}], 0x1, 0x0) [ 2881.106886][T11959] loop3: detected capacity change from 0 to 264192 [ 2881.145973][ T6747] I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2881.178616][T11953] netlink: 244 bytes leftover after parsing attributes in process `syz-executor.1'. 23:17:37 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000940), 0x8, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) 23:17:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 23:17:37 executing program 5: socket(0x6418647cb5f16385, 0x0, 0x0) 23:17:37 executing program 4: creat(&(0x7f0000000380)='./file0\x00', 0x0) r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) 23:17:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000ec0)={0x14}, 0x14}}, 0x0) 23:17:37 executing program 1: socketpair(0x33, 0x0, 0x0, &(0x7f0000000040)) 23:17:37 executing program 0: getgroups(0x2, &(0x7f0000004a40)=[0x0, 0xffffffffffffffff]) 23:17:37 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0x8, 0x0, 0x0) 23:17:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000dc0)={&(0x7f0000000bc0)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000e80), r0) 23:17:37 executing program 2: openat$vsock(0xffffffffffffff9c, &(0x7f0000000200), 0x321000, 0x0) 23:17:37 executing program 4: creat(&(0x7f00000012c0)='./file0\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) 23:17:37 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f00000127c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x70}}], 0x1, 0x0) 23:17:37 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000005140)) 23:17:37 executing program 3: add_key$fscrypt_v1(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) 23:17:37 executing program 5: semtimedop(0x0, &(0x7f0000000440)=[{0x0, 0x4, 0x800}], 0x1, &(0x7f0000000480)={0x77359400}) 23:17:37 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f00000127c0)=[{{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x1c, 0x1, 0x1, [r0, r0, 0xffffffffffffffff]}}], 0x20}}], 0x1, 0x0) 23:17:37 executing program 4: io_uring_setup(0x76fe, &(0x7f00000006c0)={0x0, 0x0, 0x4}) 23:17:37 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) pwritev(r0, &(0x7f0000000880)=[{&(0x7f00000010c0)="aabf", 0x7ffff000}], 0x1, 0x0, 0x0) 23:17:37 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000940), 0x8, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, 0x0, 0x0, 0x0) 23:17:37 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000940), 0x8, 0x0) signalfd4(r0, &(0x7f0000000040), 0x8, 0x0) 23:17:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xf, 0x1, &(0x7f0000000240)=@raw=[@call], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 23:17:37 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 23:17:37 executing program 4: openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='./binderfs/binder-control\x00', 0x0, 0x0) 23:17:37 executing program 5: r0 = creat(&(0x7f00000012c0)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 23:17:37 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) pwritev(r0, &(0x7f0000000880)=[{&(0x7f00000010c0)="aabf", 0x7ffff}], 0x1, 0x0, 0x0) 23:17:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x100040c5) 23:17:37 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) close(r0) 23:17:37 executing program 2: semtimedop(0x0, &(0x7f0000000100)=[{0x0, 0xfff9}], 0x1, 0x0) 23:17:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000001040)={'vxcan1\x00'}) 23:17:37 executing program 5: r0 = creat(&(0x7f00000012c0)='./file0\x00', 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x40010, r0, 0x0) 23:17:37 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x18}}], 0x1, 0x0) 23:17:37 executing program 2: semtimedop(0x0, &(0x7f0000000440)=[{}], 0x1, 0x0) 23:17:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1, 0x3, &(0x7f0000000140)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:17:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000003240)={0x12, 0x3, &(0x7f0000002cc0)=@framed, &(0x7f0000002d40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:17:37 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) close(r0) 23:17:37 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x14}, 0x14}}, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)={0x14}, 0x14}}, 0x0) 23:17:37 executing program 5: io_uring_setup(0x0, &(0x7f0000000240)) 23:17:37 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f00000001c0)) 23:17:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000880)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}]}]}, 0x2c}}, 0x0) 23:17:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000003240)={0x12, 0x3, &(0x7f0000002cc0)=@framed, &(0x7f0000002d40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:17:37 executing program 0: add_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0x0) 23:17:37 executing program 5: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000000)={0x20, 0x1d, 0x1, 0x0, 0x0, "", [@nested={0x11, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x20}], 0x1}, 0x0) 23:17:37 executing program 3: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000000)={0x118, 0x1d, 0x1, 0x0, 0x0, "", [@nested={0x107, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="50bb2d6f67d29d6fabadb107d0def49c88ea04abde1d5e8d3fb22a1b5046778bdafefc46b0449ade68bf84b36ec72dd71265fc2e882348c26c2126237dd5b37f5ae655b1086cda40e00aec58754734be31d750351dc076eb47d96219c08c029d1608a487f26fbe816b89f7cb81bff81a8b7a82565856555ee923c65973deb0a99b962bc0fe94a3fcae3697bd7b85b3a682167c43dbf137115a40ebddcad74875cf0d972df9e99f07976773f4d98fe3fa370d47eb640dc5061dc35817c8a66c29be82fdc2f4393c05a007d12b505a84dfdb98d568175b62421d726d1e5331e1ddfd4d770b57e0915111"]}]}, 0x118}], 0x1}, 0x0) 23:17:37 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x14}, 0x14}}, 0x0) 23:17:37 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x5}, 0x48) 23:17:37 executing program 0: semtimedop(0x0, &(0x7f0000000100)=[{0x0, 0xfff9}, {}], 0x2, &(0x7f0000000140)={0x77359400}) 23:17:37 executing program 2: creat(&(0x7f0000000380)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x802041, 0x0) 23:17:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000880)={0x28, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x28}}, 0x0) 23:17:37 executing program 3: semtimedop(0xffffffffffffffff, &(0x7f0000000000)=[{0x3, 0x1031, 0x800}, {0x2, 0x5, 0x800}, {0x2, 0x101, 0x1000}], 0x3, &(0x7f0000000080)) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/cgroup\x00') pipe2$watch_queue(&(0x7f0000004640), 0x80) 23:17:37 executing program 4: creat(&(0x7f0000000380)='./file0\x00', 0x0) stat(&(0x7f0000000d40)='./file1\x00', 0x0) 23:17:37 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0x14, 0x0, 0x0) 23:17:37 executing program 0: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x20c32, 0xffffffffffffffff, 0x0) 23:17:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000640)=@file={0x0, './file0\x00'}, 0x6e) 23:17:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 23:17:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000880)={0x30, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}]}]}, 0x30}}, 0x0) 23:17:38 executing program 1: socketpair(0x18, 0x0, 0x0, &(0x7f0000000c00)) 23:17:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:38 executing program 0: socketpair(0x2a, 0x0, 0x0, &(0x7f00000000c0)) 23:17:38 executing program 2: socketpair(0x29, 0x0, 0x0, &(0x7f0000006500)) 23:17:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:17:38 executing program 3: creat(&(0x7f0000000380)='./file0\x00', 0x0) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)='system_u:object_r:chkpwd_exec_t:s0\x00', 0x23, 0x0) 23:17:38 executing program 1: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:17:38 executing program 0: pipe2$watch_queue(&(0x7f0000004640), 0x80) 23:17:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:38 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) 23:17:38 executing program 5: bpf$BPF_PROG_GET_FD_BY_ID(0x11, 0x0, 0x0) [ 2882.298765][T12086] af_packet: tpacket_rcv: packet too big, clamped from 64989 to 32624. macoff=96 23:17:38 executing program 3: r0 = semget$private(0x0, 0x3, 0x5d3) semtimedop(r0, &(0x7f0000000440)=[{0x0, 0x4}], 0x1, &(0x7f0000000480)={0x77359400}) 23:17:38 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x20) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0x0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x438, 0x438, 0x438, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, [], [], 'veth1_to_hsr\x00', 'ipvlan1\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "461ca676c1f86ea054598d8451a36057d072f700c379a4e69d1ceb718be6"}}}, {{@ipv6={@rand_addr=' \x01\x00', @private0, [], [], 'syz_tun\x00', 'wlan0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE3={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffc}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) [ 2882.363135][T12094] SELinux: Context system_u:object_r:chkpwd_exec_t:s0 is not valid (left unmapped). [ 2882.373054][ T24] audit: type=1400 audit(1652311058.210:641): avc: denied { relabelto } for pid=12091 comm="syz-executor.3" name="file0" dev="sda1" ino=1139 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:chkpwd_exec_t:s0" 23:17:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[], 0x30}}, 0x0) 23:17:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:38 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000500)={'wpan0\x00'}) 23:17:38 executing program 2: socketpair(0x22, 0x0, 0x97, &(0x7f0000000040)) [ 2882.419971][ T24] audit: type=1400 audit(1652311058.260:642): avc: denied { unlink } for pid=23125 comm="syz-executor.3" name="file0" dev="sda1" ino=1139 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:chkpwd_exec_t:s0" 23:17:38 executing program 3: getgroups(0x1, &(0x7f00000126c0)=[0xffffffffffffffff]) 23:17:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='{'], 0x44}}, 0x0) 23:17:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x14, 0x0, 0x0, 0x70bd2c}, 0x14}}, 0x0) 23:17:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:38 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, 0x0, 0x0, 0x4de11aed639ad1d3) 23:17:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x60}, 0x0) 23:17:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x44}}, 0x0) 23:17:38 executing program 1: r0 = getpgrp(0xffffffffffffffff) r1 = getpid() kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, 0x0) 23:17:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:38 executing program 0: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000000)={0x20, 0x1d, 0x1, 0x0, 0x0, "", [@nested={0xf, 0x0, 0x0, 0x1, [@typed={0xc, 0x1, 0x0, 0x0, @u64}]}]}, 0x20}], 0x1}, 0x0) 23:17:38 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000940), 0x8, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000980), &(0x7f00000009c0)='./file0\x00', 0x8, 0x0) 23:17:38 executing program 5: r0 = semget$private(0x0, 0x3, 0x0) semtimedop(r0, &(0x7f0000000440)=[{}], 0x1, 0x0) 23:17:38 executing program 3: getpeername$unix(0xffffffffffffffff, 0x0, &(0x7f0000000600)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) 23:17:38 executing program 1: r0 = creat(&(0x7f00000012c0)='./file0\x00', 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x100010, r0, 0x0) 23:17:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:38 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) creat(&(0x7f00000012c0)='./file0\x00', 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f00000127c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@cred={{0x1c, 0x1, 0x2, {0x0, r1}}}], 0x20}}], 0x1, 0x0) 23:17:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg(r0, &(0x7f0000003b00)=[{{&(0x7f0000000000)=@l2tp, 0x80, 0x0}}], 0x1, 0x0) 23:17:38 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f00000127c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}}], 0x1, 0x0) 23:17:38 executing program 3: creat(&(0x7f0000000380)='./file0\x00', 0x0) r0 = creat(&(0x7f00000012c0)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @empty}}}, 0x30) 23:17:38 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000000)={0x118, 0x1d, 0x1, 0x0, 0x0, "", [@nested={0x113, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="50bb2d6f67d29d6fabadb107d0def49c88ea04abde1d5e8d3fb22a1b5046778bdafefc46b0449ade68bf84b36ec72dd71265fc2e882348c26c2126237dd5b37f5ae655b1086cda40e00aec58754734be31d750351dc076eb47d96219c08c029d1608a487f26fbe816b89f7cb81bff81a8b7a82565856555ee923c65973deb0a99b962bc0fe94a3fcae3697bd7b85b3a682167c43dbf137115a40ebddcad74875cf0d972df9e99f07976773f4d98fe3fa370d47eb640dc5061dc35817c8a66c29be82fdc2f4393c05a007d12b505a84dfdb98d568175b62421d726d1e5331e1ddfd4d770b57e0915111"]}]}, 0x118}], 0x1}, 0x0) 23:17:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:38 executing program 0: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000680)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) fstat(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000680)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) 23:17:38 executing program 2: semtimedop(0x0, &(0x7f0000000100)=[{0x0, 0xfff9}, {0x0, 0xc496}, {0x0, 0x0, 0x1000}], 0x3, &(0x7f0000000140)={0x77359400}) 23:17:38 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 23:17:38 executing program 3: syz_genetlink_get_family_id$ipvs(&(0x7f00000050c0), 0xffffffffffffffff) 23:17:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:38 executing program 1: creat(&(0x7f0000000380)='./file0\x00', 0x0) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)='system_u:object_r:hald_var_run_t:s0\x00', 0x24, 0x0) 23:17:38 executing program 0: semtimedop(0x0, &(0x7f0000000100)=[{}, {}], 0x2, 0x0) 23:17:38 executing program 2: io_uring_setup(0x2e26, &(0x7f0000000080)={0x0, 0x6cb6, 0x8}) 23:17:38 executing program 3: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000000)={0x20, 0x1d, 0x1, 0x0, 0x0, "", [@nested={0x7, 0x0, 0x0, 0x1, [@typed={0xc, 0x1, 0x0, 0x0, @u64}]}]}, 0x20}], 0x1}, 0x0) 23:17:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:38 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000540)={'wpan3\x00'}) 23:17:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000880)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}]}]}, 0x2c}}, 0x0) 23:17:38 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter={0x1e, 0x0, 0x80, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x48) [ 2883.088176][T12172] SELinux: Context system_u:object_r:hald_var_run_t:s0 is not valid (left unmapped). [ 2883.097967][ T24] audit: type=1400 audit(1652311058.940:643): avc: denied { relabelto } for pid=12167 comm="syz-executor.1" name="file0" dev="sda1" ino=1177 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:hald_var_run_t:s0" 23:17:39 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x0, 0x0, 0x0, 0x0, 0x224}, 0x48) [ 2883.189527][ T24] audit: type=1400 audit(1652311059.030:644): avc: denied { unlink } for pid=21187 comm="syz-executor.1" name="file0" dev="sda1" ino=1177 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:hald_var_run_t:s0" 23:17:39 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup/syz1\x00', 0x200002, 0x0) 23:17:39 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:39 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f00000127c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32], 0x70}}], 0x1, 0x0) 23:17:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg(r0, &(0x7f0000003b00)=[{{&(0x7f0000000000)=@l2tp, 0x80, 0x0}}], 0x1, 0x4c011) 23:17:39 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f00000127c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0) 23:17:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x0) 23:17:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x14}, 0x14}}, 0x0) 23:17:39 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) connect$unix(r0, &(0x7f0000000040)=@abs={0x1}, 0x6e) 23:17:39 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) ioctl$PPPIOCSMRRU(r0, 0x8008743f, &(0x7f0000000000)) 23:17:39 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000080)={0x29}) 23:17:39 executing program 4: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:39 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x48) 23:17:39 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) getsockname$unix(r0, 0x0, &(0x7f0000000380)) 23:17:39 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000940), 0x8, 0x0) connect$caif(r0, &(0x7f00000000c0)=@util={0x25, "b1448d425ce111ff00c4d0f7b6bedd6f"}, 0x18) 23:17:39 executing program 4: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:39 executing program 1: getgroups(0x2, &(0x7f0000004700)=[0x0, 0x0]) 23:17:39 executing program 3: semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f00000065c0)=""/2) 23:17:39 executing program 5: semtimedop(0x0, &(0x7f0000000100)=[{0x3}, {0x0, 0x0, 0x1000}], 0x2, 0x0) 23:17:39 executing program 0: creat(&(0x7f0000000380)='./file0\x00', 0x0) stat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) 23:17:39 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f00000127c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x20}}], 0x1, 0x0) 23:17:39 executing program 4: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:39 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f00000127c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x28}}], 0x1, 0x0) 23:17:39 executing program 3: socketpair(0x21, 0x0, 0x0, &(0x7f0000000200)) 23:17:40 executing program 5: creat(&(0x7f0000000380)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 23:17:40 executing program 0: semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f00000003c0)) 23:17:40 executing program 2: syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) add_key(&(0x7f0000000740)='rxrpc_s\x00', 0x0, &(0x7f00000007c0)="8d", 0x1, 0x0) 23:17:40 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:40 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0x19, 0x0, 0x0) 23:17:40 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f00000127c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0) 23:17:40 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:17:40 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={@mcast2, @rand_addr=' \x01\x00', @mcast2, 0x0, 0x0, 0x6}) 23:17:40 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:40 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter={0x1e, 0x0, 0x80, 0x9, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, 0x48) 23:17:40 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f00000127c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}}], 0x1, 0x0) 23:17:40 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f00000127c0)=[{{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0}}], 0x1, 0x0) 23:17:40 executing program 5: syz_genetlink_get_family_id$ipvs(&(0x7f00000050c0), 0xffffffffffffffff) socketpair(0x18, 0x0, 0x0, &(0x7f0000005140)) 23:17:40 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000042c0), 0x0, 0x0) read$rfkill(r0, 0x0, 0x0) 23:17:40 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:40 executing program 2: ioctl$PPPIOCGMRU(0xffffffffffffffff, 0x80047453, 0x0) pipe2$watch_queue(0x0, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 23:17:40 executing program 1: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240), 0x4000, 0x0) 23:17:40 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x5, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x0, 0x4}, 0x48) 23:17:40 executing program 5: r0 = getpgrp(0x0) r1 = socket$unix(0x1, 0x1, 0x0) creat(&(0x7f00000012c0)='./file0\x00', 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f00000127c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@cred={{0x1c, 0x1, 0x2, {r0, r2}}}], 0x20}}], 0x1, 0x0) 23:17:40 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:40 executing program 0: semctl$GETALL(0x0, 0x0, 0xd, &(0x7f00000045c0)=""/88) 23:17:40 executing program 2: socketpair(0x28, 0x0, 0x7, &(0x7f0000000240)) 23:17:40 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f00000127c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}}], 0x1, 0x0) 23:17:40 executing program 3: openat$vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x10001, 0x0) 23:17:40 executing program 5: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340), 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) creat(0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000001, 0x10, 0xffffffffffffffff, 0x0) io_uring_setup(0x1bc3, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x3a1}) 23:17:40 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) 23:17:40 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) bind$l2tp(r0, &(0x7f0000000600)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x22}}, 0x10) 23:17:40 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 23:17:40 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xf, 0x0, 0x0, 0x9}, 0x48) 23:17:40 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:40 executing program 5: semtimedop(0x0, &(0x7f0000000100)=[{0x0, 0xfff9}], 0x1, &(0x7f0000000140)={0x77359400}) 23:17:40 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) ioctl$PPPIOCSMRRU(r0, 0x4004743c, 0x0) 23:17:40 executing program 2: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0xee012f8a81e58348, 0x0) 23:17:40 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000fc0), 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001840), r0) 23:17:40 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:40 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0x7, 0x0, 0x0) 23:17:40 executing program 3: socketpair(0x5, 0x0, 0x0, &(0x7f0000000080)) [ 2884.817539][T12302] syz-executor.0 (12302) used obsolete PPPIOCDETACH ioctl 23:17:40 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:40 executing program 0: semtimedop(0x0, &(0x7f0000000440)=[{}], 0x1, &(0x7f0000000480)={0x77359400}) 23:17:41 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0x4, 0x0, 0x0) 23:17:41 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0x23, 0x0, 0x0) 23:17:41 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0x0) creat(&(0x7f00000012c0)='./file0\x00', 0x0) openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='./binderfs/binder-control\x00', 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000127c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee00}}}, @cred={{0x1c}}], 0x40}}], 0x1, 0x0) 23:17:41 executing program 5: bpf$BPF_PROG_GET_FD_BY_ID(0x1e, 0x0, 0x0) 23:17:41 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0x1b, 0x0, 0x0) 23:17:41 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:41 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x5, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 23:17:41 executing program 3: r0 = creat(&(0x7f00000012c0)='./file0\x00', 0x0) connect$unix(r0, 0x0, 0x0) 23:17:41 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) pwritev(r0, &(0x7f0000000880)=[{&(0x7f00000010c0)="aabf", 0x7ffff}], 0x1, 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_int(r1, 0x107, 0x0, 0x0, 0x0) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f00000004c0)={0x0, 0x0, 0x0}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000005640), 0x4) 23:17:41 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:41 executing program 0: semtimedop(0x0, &(0x7f0000000440)=[{0x0, 0x4}], 0x1, 0x0) 23:17:41 executing program 2: clock_gettime(0x0, &(0x7f0000000340)={0x0}) pselect6(0x40, &(0x7f0000000280)={0x3}, &(0x7f00000002c0)={0x6}, 0x0, &(0x7f0000000380)={r0}, 0x0) 23:17:41 executing program 3: semtimedop(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) 23:17:41 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, 0x0, 0x0) 23:17:41 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:41 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter={0x1e, 0x0, 0x80, 0x9, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x0, 0x8}, 0x48) 23:17:41 executing program 2: getsockopt$SO_J1939_PROMISC(0xffffffffffffffff, 0x6b, 0x2, 0x0, 0x0) 23:17:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) 23:17:41 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000001c0)) 23:17:41 executing program 5: r0 = getpgrp(0x0) r1 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r1, &(0x7f00000127c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@cred={{0x1c, 0x1, 0x2, {r0}}}], 0x20}}], 0x1, 0x0) 23:17:41 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:41 executing program 0: sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x0) 23:17:41 executing program 2: socketpair(0x10, 0x0, 0x400, &(0x7f00000000c0)) 23:17:41 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000800)={0xc, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x1, 0x99, &(0x7f0000000380)=""/153, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:17:41 executing program 1: signalfd4(0xffffffffffffffff, &(0x7f0000002100), 0x8, 0x81000) 23:17:41 executing program 5: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000000)={0x20, 0x1d, 0x1, 0x0, 0x0, "", [@nested={0x15, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x20}], 0x1}, 0x0) 23:17:41 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640), 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:41 executing program 0: io_uring_setup(0x510b, &(0x7f0000000000)={0x0, 0x0, 0x20}) 23:17:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x14}, 0x14}}, 0x0) 23:17:41 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) 23:17:41 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0x21, 0x0, 0x0) 23:17:41 executing program 5: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000000)={0x20, 0x1d, 0x1, 0x0, 0x0, "", [@nested={0x12, 0x0, 0x0, 0x1, [@typed={0xc, 0x1, 0x0, 0x0, @u64}]}]}, 0x20}], 0x1}, 0x0) 23:17:41 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640), 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:41 executing program 0: creat(&(0x7f0000000380)='./file0\x00', 0x0) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) 23:17:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg(r0, &(0x7f0000003b00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 23:17:41 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x20) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x490, 0xffffffff, 0x0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x438, 0x438, 0x438, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, [], [], 'veth1_to_hsr\x00', 'ipvlan1\x00'}, 0x0, 0x1e0, 0x220, 0x0, {}, [@common=@inet=@recent1={{0x108}, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}, @common=@frag={{0x30}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "461ca676c1f86ea054598d8451a36057d072f700c379a4e69d1ceb718be6"}}}, {{@ipv6={@rand_addr=' \x01\x00', @private0, [], [], 'syz_tun\x00', 'wlan0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE3={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 23:17:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000880)={0x20, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) 23:17:42 executing program 5: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x9000) 23:17:42 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640), 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:42 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter={0x1e, 0x0, 0x80, 0x9, 0x2, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x48) 23:17:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x14}, 0x14}}, 0x0) 23:17:42 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000880)={0x34, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x34}}, 0x0) 23:17:42 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x6}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x5d) 23:17:42 executing program 5: socketpair(0x1f, 0x0, 0x0, &(0x7f0000000300)) 23:17:42 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x2, &(0x7f0000000080)=@raw=[@map_idx], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:17:42 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x3, 0x0, 0x0, 0xa8}, 0x48) 23:17:42 executing program 3: add_key(&(0x7f0000000740)='rxrpc_s\x00', 0x0, &(0x7f00000007c0)="8d", 0x1, 0x0) 23:17:42 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 23:17:42 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x5}, 0x6e) sendmsg(r0, &(0x7f0000000080)={0x0, 0x2f, &(0x7f0000000100)=[{&(0x7f0000000000)="2c0200010300072a", 0x584}], 0x1}, 0x0) 23:17:42 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:42 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, 0x0) 23:17:42 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0x12, 0x0, 0x0) 23:17:42 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x1) 23:17:42 executing program 1: io_uring_setup(0x2e26, &(0x7f0000000080)={0x0, 0x0, 0x8}) 23:17:42 executing program 5: r0 = io_uring_setup(0xe7b, &(0x7f00000002c0)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) 23:17:42 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:42 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000011f00), 0x264402, 0x0) 23:17:42 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x20) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 23:17:42 executing program 1: semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000180)=""/57) 23:17:42 executing program 0: creat(&(0x7f00000012c0)='./file0\x00', 0x0) lstat(&(0x7f0000011f40)='./file0\x00', &(0x7f0000011f80)) getresuid(&(0x7f0000012480), &(0x7f00000124c0), &(0x7f0000012500)) 23:17:42 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000940), 0x8, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x1, &(0x7f0000000000)=@raw=[@alu], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x80) 23:17:42 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, 0x0, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:42 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x111, r0, 0x0) 23:17:42 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0x9, 0x0, 0x0) 23:17:42 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) ioctl$PPPIOCSMRRU(r0, 0x4010744d, &(0x7f0000000000)) 23:17:42 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x5, 0x7, 0x443, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x48) [ 2886.643912][T12439] ================================================================== [ 2886.652000][T12439] BUG: KCSAN: data-race in jbd2_journal_commit_transaction / jbd2_log_wait_commit [ 2886.661178][T12439] [ 2886.663479][T12439] write to 0xffff888103cd9468 of 4 bytes by task 1404 on cpu 1: [ 2886.671079][T12439] jbd2_journal_commit_transaction+0x2805/0x3180 [ 2886.677388][T12439] kjournald2+0x253/0x460 [ 2886.681692][T12439] kthread+0x1a9/0x1e0 [ 2886.685740][T12439] ret_from_fork+0x1f/0x30 [ 2886.690149][T12439] [ 2886.692450][T12439] read to 0xffff888103cd9468 of 4 bytes by task 12439 on cpu 0: [ 2886.700051][T12439] jbd2_log_wait_commit+0xbb/0x220 [ 2886.705139][T12439] jbd2_journal_stop+0x504/0x670 [ 2886.710054][T12439] __ext4_journal_stop+0x99/0x110 [ 2886.715058][T12439] ext4_symlink+0x4c6/0x6f0 [ 2886.719539][T12439] vfs_symlink+0x18a/0x280 [ 2886.723930][T12439] do_symlinkat+0xe2/0x330 [ 2886.728322][T12439] __x64_sys_symlinkat+0x5e/0x70 [ 2886.733234][T12439] do_syscall_64+0x2b/0x70 [ 2886.737630][T12439] entry_SYSCALL_64_after_hwframe+0x44/0xae 23:17:42 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x20) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x508, 0xffffffff, 0x0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x438, 0x438, 0x438, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, [], [], 'veth1_to_hsr\x00', 'ipvlan1\x00'}, 0x0, 0x1e0, 0x220, 0x0, {}, [@common=@inet=@recent1={{0x108}, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}, @common=@frag={{0x30}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "461ca676c1f86ea054598d8451a36057d072f700c379a4e69d1ceb718be6"}}}, {{@ipv6={@rand_addr=' \x01\x00', @private0, [], [], 'syz_tun\x00', 'wlan0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE3={0x28}}, {{@uncond, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={{0x30}}, @common=@hbh={{0x48}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffc}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x568) [ 2886.743501][T12439] [ 2886.745799][T12439] value changed: 0x0000735f -> 0x00007360 [ 2886.751487][T12439] [ 2886.753789][T12439] Reported by Kernel Concurrency Sanitizer on: [ 2886.759911][T12439] CPU: 0 PID: 12439 Comm: syz-executor.5 Not tainted 5.18.0-rc6-syzkaller-00009-gfeb9c5e19e91 #0 [ 2886.770383][T12439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2886.780499][T12439] ================================================================== 23:17:42 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, 0x0, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 23:17:42 executing program 3: r0 = getpgrp(0xffffffffffffffff) r1 = getpid() kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, &(0x7f00000022c0)) 23:17:42 executing program 0: socketpair(0x25, 0x0, 0x0, &(0x7f0000000780)) 23:17:42 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x2}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x13) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)={'wg0\x00'}) 23:17:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000007440)=[{{0x0, 0x0, &(0x7f0000000480)=[{0x0}, {&(0x7f0000000400)='w', 0x1}], 0x2}}], 0x1, 0x0) 23:17:42 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, 0x0, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) [ 2886.907484][T12453] x_tables: duplicate underflow at hook 2 23:17:42 executing program 3: signalfd4(0xffffffffffffffff, &(0x7f0000000c00), 0x8, 0x0) 23:17:42 executing program 2: r0 = io_uring_setup(0xe7b, &(0x7f00000002c0)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 23:17:42 executing program 0: creat(&(0x7f00000012c0)='./file0\x00', 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x20c32, 0xffffffffffffffff, 0x0) 23:17:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) 23:17:42 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x0, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:42 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x2}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x13) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)={'wg0\x00'}) [ 2887.015040][T12464] tap0: tun_chr_ioctl cmd 2147767506 23:17:42 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x8, 0x3, &(0x7f0000000540)=@framed, &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 23:17:42 executing program 2: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000000)={0x20, 0x1d, 0x1, 0x0, 0x0, "", [@nested={0x12, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x20}], 0x1}, 0x0) 23:17:42 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x5, 0x7}, 0x48) 23:17:42 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x0, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:43 executing program 3: semtimedop(0x0, &(0x7f0000000100)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000140)={0x77359400}) 23:17:43 executing program 2: add_key(&(0x7f0000000740)='rxrpc_s\x00', 0x0, 0x0, 0x0, 0x0) [ 2887.143016][T12478] tap0: tun_chr_ioctl cmd 2147767506 23:17:43 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x2}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x13) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)={'wg0\x00'}) 23:17:43 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f00000000c0)='./file0\x00', 0x8, 0x0) 23:17:43 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x0, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) [ 2887.301378][T12493] tap0: tun_chr_ioctl cmd 2147767506 23:17:43 executing program 1: socket$unix(0x1, 0x0, 0x0) openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='./binderfs/binder-control\x00', 0x0, 0x0) 23:17:43 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:17:43 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x2}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x13) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)={'wg0\x00'}) 23:17:43 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x0, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:43 executing program 0: io_uring_setup(0x1007f09, &(0x7f0000000240)) 23:17:43 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x0, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:43 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0x3, 0x0, 0x0) [ 2887.995266][T12504] tap0: tun_chr_ioctl cmd 2147767506 23:17:43 executing program 3: setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, 0x0, 0x0) 23:17:43 executing program 2: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000000)={0x20, 0x1d, 0x1, 0x0, 0x0, "", [@nested={0x11, 0x0, 0x0, 0x1, [@typed={0xc, 0x1, 0x0, 0x0, @u64}]}]}, 0x20}], 0x1}, 0x0) 23:17:43 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f000000bb40), 0x0, 0x0) 23:17:43 executing program 1: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000009, 0x20c32, 0xffffffffffffffff, 0x0) 23:17:43 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x0, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:43 executing program 0: clock_gettime(0x4, &(0x7f0000002dc0)) 23:17:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffffff}, 0x0) 23:17:43 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000042c0), 0x0, 0x0) read$rfkill(r0, &(0x7f0000004300), 0x8) 23:17:43 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x20) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x508, 0xffffffff, 0x0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x438, 0x438, 0x438, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, [], [], 'veth1_to_hsr\x00', 'ipvlan1\x00'}, 0x0, 0x1e0, 0x220, 0x0, {}, [@common=@inet=@recent1={{0x108}, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}, @common=@frag={{0x30}, {[0x0, 0xffff]}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "461ca676c1f86ea054598d8451a36057d072f700c379a4e69d1ceb718be6"}}}, {{@ipv6={@rand_addr=' \x01\x00', @private0, [], [], 'syz_tun\x00', 'wlan0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE3={0x28}}, {{@uncond, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={{0x30}}, @common=@hbh={{0x48}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffc}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x568) 23:17:44 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x0, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:44 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000fc0), 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 23:17:44 executing program 3: getresuid(&(0x7f0000005d00), &(0x7f0000005d40), &(0x7f0000005d80)) 23:17:44 executing program 2: r0 = creat(&(0x7f00000012c0)='./file0\x00', 0x0) io_uring_setup(0x2468, &(0x7f0000000040)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}) 23:17:44 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 23:17:44 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0x2, 0x0, 0x0) 23:17:44 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x0, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:44 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000500)={'wpan0\x00'}) [ 2888.229549][T12527] x_tables: duplicate underflow at hook 2 23:17:44 executing program 3: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000000)={0x20, 0x1d, 0x1, 0x0, 0x0, "", [@nested={0xf, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x20}], 0x1}, 0x0) 23:17:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000007440)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[{0x10}], 0x10}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 23:17:44 executing program 5: r0 = getpgrp(0xffffffffffffffff) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, 0x0) 23:17:44 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xb, 0x0, 0x0) 23:17:44 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x0, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:44 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="021eeeffffff01000000ff0700000000000042000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 23:17:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[], 0x44}}, 0x0) 23:17:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000007440)=[{{&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480)=[{&(0x7f00000003c0)="91", 0x1}, {&(0x7f0000000400)='w', 0x1}], 0x2, &(0x7f00000004c0)=[{0x18, 0x0, 0x0, "fa"}, {0x10}], 0x28}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 23:17:44 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter={0x1e, 0x0, 0x80, 0x9, 0x0, 0x1}, 0x48) 23:17:44 executing program 1: getgroups(0x1, &(0x7f0000004700)=[0x0]) 23:17:44 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x0, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:44 executing program 3: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000001f00)) [ 2888.477723][T12556] loop0: detected capacity change from 0 to 1 23:17:44 executing program 2: fchownat(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x6) 23:17:44 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername$unix(r0, 0x0, &(0x7f0000000080)) 23:17:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, 0x0, 0x0) 23:17:44 executing program 1: socketpair(0x18, 0x0, 0x5e92017f, &(0x7f0000005140)) 23:17:44 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x0, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:44 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) 23:17:44 executing program 2: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000900)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 23:17:44 executing program 5: r0 = getpgrp(0x0) wait4(r0, 0x0, 0x0, 0x0) 23:17:44 executing program 0: readv(0xffffffffffffffff, &(0x7f00000014c0)=[{0x0}], 0x1) semctl$GETALL(0x0, 0x0, 0x6, &(0x7f0000001d80)=""/87) 23:17:44 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000480), 0x0) 23:17:44 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x0, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:44 executing program 3: readv(0xffffffffffffffff, &(0x7f00000014c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) 23:17:44 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001680)=[{0x0}], 0x1}, 0x0) 23:17:44 executing program 5: semctl$SETVAL(0x0, 0x0, 0x8, 0x0) 23:17:44 executing program 0: socketpair(0x0, 0x0, 0x4, 0x0) 23:17:44 executing program 1: recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)=@abs, 0x8) 23:17:44 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:44 executing program 3: semctl$GETPID(0x0, 0x0, 0x4, &(0x7f0000001180)=""/6) 23:17:44 executing program 2: semctl$SETALL(0x0, 0x0, 0x9, &(0x7f0000001280)) 23:17:44 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000e80)) 23:17:44 executing program 1: sendmsg$unix(0xffffffffffffff9c, 0x0, 0x0) 23:17:44 executing program 0: sendmsg$unix(0xffffffffffffffff, &(0x7f0000002680)={0x0, 0x0, &(0x7f0000002300)=[{0x0}], 0x1}, 0x0) 23:17:44 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:44 executing program 3: readv(0xffffffffffffffff, &(0x7f00000014c0)=[{0x0}], 0x1) 23:17:44 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) fcntl$lock(r0, 0x8, 0x0) 23:17:44 executing program 5: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) readlink(&(0x7f0000000600)='./file0/file0\x00', 0x0, 0x0) 23:17:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0x58) setuid(0xee01) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) chmod(&(0x7f0000000480)='./file0/file0\x00', 0x3d2) r0 = open$dir(&(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0/file0\x00', r0, &(0x7f0000000140)='./file0\x00') symlinkat(&(0x7f0000000280)='./file0/file0\x00', r0, &(0x7f0000000200)='./file1\x00') renameat(r0, &(0x7f00000001c0)='./file0\x00', r0, &(0x7f0000000240)='./file1\x00') 23:17:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) 23:17:44 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@random="f51e5b7e4df3", @random="32340cc118d2", @val={@val={0x8100}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @loopback={0xffffffff00000000}, @remote, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:17:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000880)='./file1\x00', 0x0) 23:17:44 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 23:17:44 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) shutdown(r0, 0x2) 23:17:44 executing program 0: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x0, 0x0}, 0x0) 23:17:44 executing program 1: semctl$GETALL(0x0, 0x0, 0x6, 0x0) 23:17:44 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0x0, 0x0, 0x0) 23:17:44 executing program 3: r0 = socket$inet6(0x18, 0x2, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) sendmsg$unix(r2, &(0x7f00000002c0)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x2}, 0x8, 0x0, 0x0, &(0x7f0000000040)=[@rights, @cred], 0x48}, 0x0) 23:17:45 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000001300), 0x0) 23:17:45 executing program 5: syz_emit_ethernet(0xfffffffffffffe87, 0x0, 0x0) 23:17:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind$unix(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="10011a"], 0x10) bind$unix(r0, &(0x7f0000000080)=@file={0xa}, 0xa) 23:17:45 executing program 1: r0 = socket(0x11, 0x3, 0x0) sendmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0xd) 23:17:45 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0x0, 0x0, 0x0) 23:17:45 executing program 2: r0 = socket$inet(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000), 0x10) getsockname$inet(r0, 0x0, &(0x7f0000000080)) 23:17:45 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) 23:17:45 executing program 5: madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2) mincore(&(0x7f0000ffd000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/79) 23:17:45 executing program 0: r0 = socket$inet(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000), 0x10) 23:17:45 executing program 1: symlinkat(&(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00') symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00') 23:17:45 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000005640)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) syz_emit_ethernet(0x0, 0x0, 0x0) 23:17:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x700}, 0x0) 23:17:45 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000500), 0x80, 0x0, 0x0, &(0x7f0000000b80)=[{0x18, 0x0, 0x0, "d9"}, {0x10}], 0x28}, 0x4000001) 23:17:45 executing program 5: mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) r0 = socket$inet6(0x18, 0x3, 0x0) bind$inet6(r0, &(0x7f0000000040)={0x18}, 0xc) 23:17:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000280)="64d3dfe672e03851d6b9cdef7d6a8144fae52b018b9a579faf55da2a9009b0ef7f2d27bc772dbaf216065d1e72b008d3b24c7518832ddfcc7ce96e66d9f9ff5d64df1d2d1bf9f713822c7535cc0801a3ce5adf62cdbd8caa7b3801a9d72393f4e5941cd43fc1de48ac88115b100c56d7dbf6344ea3a35815c2a33636a885d4a4bd6cca719f0e828b01ad237904b2e969de30552cf6113ce7a498a3a025d584436b13e0a7730650664e8a2efdde0000000000f9c9e9bb1e1293a814712f05e369d8bed2133d604ead41596a9967d43a943f5dd09968fb0c52b605190a8d98c830c1", 0xe1, 0x0, 0x0, 0x0) 23:17:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000080)=@abs={0x8}, 0x8) 23:17:45 executing program 4: symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') chown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xffffffffffffffff) 23:17:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r0, 0x0, &(0x7f0000000100)) 23:17:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[{0x10}], 0x10}, 0x0) 23:17:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0), r1) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000400cf000000eeffffff", @ANYRES32=r2, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="500000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002800128009000100766c616e00000000180002800c0002001c0000001b000000060001000100000008000500", @ANYRES32=r7], 0x50}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'bridge_slave_1\x00'}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x3c}}, 0x0) 23:17:45 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="5a6a57ddde345bf06f42cb7185a88d2a035bdbff1ab86212c3015d3f5c9a20232d443ea273785f24", 0x28}], 0x1}}], 0x1, 0xffd8) 23:17:45 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000002580)={0x10, 0x2}, 0x10) getsockname$inet(r0, 0x0, &(0x7f0000000100)) 23:17:45 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='cdg\x00', 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="05", 0x7e53d) 23:17:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001380)={&(0x7f0000000d00), 0x80, 0x0}, 0x0) 23:17:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000001680)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000005a80)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000263c1b6dda3b706cc6"], 0x58}, 0x0) 23:17:45 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="5a6a57ddde345bf06f42cb7185a88d2a035bdbff1ab86212c3015d3f5c9a20232d443ea273785f24", 0x28}], 0x1}}], 0x1, 0xffd8) [ 2889.573313][T12681] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2889.590909][T12681] device bridge_slave_1 left promiscuous mode [ 2889.597114][T12681] bridge0: port 2(bridge_slave_1) entered disabled state [ 2889.604763][T12681] bridge69: port 1(bridge_slave_1) entered blocking state [ 2889.611936][T12681] bridge69: port 1(bridge_slave_1) entered disabled state 23:17:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0), r1) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000400cf000000eeffffff", @ANYRES32=r2, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="500000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002800128009000100766c616e00000000180002800c0002001c0000001b000000060001000100000008000500", @ANYRES32=r7], 0x50}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'bridge_slave_1\x00'}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x3c}}, 0x0) [ 2889.620263][T12681] device bridge_slave_1 entered promiscuous mode 23:17:45 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x1600bd80, 0x0, 0x810) 23:17:45 executing program 3: semtimedop(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x1, 0x0) 23:17:45 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='cdg\x00', 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="05", 0x7e53d) 23:17:45 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x1600bd78, 0x0, 0x810) 23:17:45 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="5a6a57ddde345bf06f42cb7185a88d2a035bdbff1ab86212c3015d3f5c9a20232d443ea273785f24", 0x28}], 0x1}}], 0x1, 0xffd8) 23:17:45 executing program 4: chown(&(0x7f00000011c0)='./file0\x00', 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000001200)=""/198) [ 2889.740571][T12695] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2889.771699][T12695] device bridge_slave_1 left promiscuous mode [ 2889.777933][T12695] bridge69: port 1(bridge_slave_1) entered disabled state 23:17:45 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x81c0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file3\x00', 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file2\x00', 0x0, 0x0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000000)='./file3\x00', 0xffffffffffffff9c, &(0x7f0000000700)='./file7\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000780)='./file3\x00', 0xffffffffffffff9c, &(0x7f00000007c0)='./file7\x00', 0x0) 23:17:45 executing program 3: mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x81c0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file3\x00', 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file2\x00', 0x0, 0x0, 0x0) mknodat(0xffffffffffffff9c, 0x0, 0x0, 0x0) linkat(0xffffffffffffff9c, &(0x7f00000006c0)='./file2\x00', 0xffffffffffffff9c, &(0x7f0000000700)='./file7\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000780)='./file3\x00', 0xffffffffffffff9c, &(0x7f00000007c0)='./file7\x00', 0x0) 23:17:45 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x3}, 0xfffffffffffffffe) [ 2889.788622][T12695] bridge70: port 1(bridge_slave_1) entered blocking state [ 2889.795890][T12695] bridge70: port 1(bridge_slave_1) entered disabled state [ 2889.803908][T12695] device bridge_slave_1 entered promiscuous mode 23:17:45 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='cdg\x00', 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="05", 0x7e53d) 23:17:45 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="5a6a57ddde345bf06f42cb7185a88d2a035bdbff1ab86212c3015d3f5c9a20232d443ea273785f24", 0x28}], 0x1}}], 0x1, 0xffd8) 23:17:45 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 23:17:45 executing program 2: socket(0x1, 0x0, 0xffffffff) 23:17:45 executing program 5: keyctl$search(0xa, 0x0, &(0x7f0000001140)='.dead\x00', 0x0, 0x0) 23:17:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x21, 0x0, 0x0) 23:17:45 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="5a6a57ddde345bf06f42cb7185a88d2a035bdbff1ab86212c3015d3f5c9a20232d443ea273785f24", 0x28}], 0x1}}], 0x1, 0xffd8) 23:17:45 executing program 4: creat(&(0x7f0000000040)='./bus\x00', 0x0) 23:17:45 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89fb, &(0x7f0000000140)={'sit0\x00', 0x0}) 23:17:45 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000000000002004e23ac1414bb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000002"], 0x490) 23:17:45 executing program 3: r0 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000800)={'tunl0\x00', 0x0}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) getpeername$packet(r0, &(0x7f0000000000), &(0x7f0000000040)=0x14) bind(r0, &(0x7f0000000440)=@xdp={0x2c, 0xa, 0x0, 0x1f}, 0x80) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000240)={'syztnl0\x00', &(0x7f0000000180)={'syztnl1\x00', r1, 0x71, 0x80, 0x1, 0x5, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x700, 0x700, 0x8000, 0x5}}) socket$netlink(0x10, 0x3, 0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20004}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[@ANYBLOB="88000000320001002abd7000fbdbdf25000000000c0002000100000001000000680001000c000200000000003f0000000c001800080003000c000100736b62656469740000000c00050008000100627066000c00000008000300ffff00000c001c0008000100697074000c00090007000100787400"/128], 0x88}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x222c0, 0x30) r4 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r3, r4, 0x0, 0xef85) sendfile(0xffffffffffffffff, r3, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0x4, &(0x7f00000000c0)=0xfffff001, 0x4) socket$nl_route(0x10, 0x3, 0x0) 23:17:45 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="5a6a57ddde345bf06f42cb7185a88d2a035bdbff1ab86212c3015d3f5c9a20232d443ea273785f24", 0x28}], 0x1}}], 0x1, 0xffd8) 23:17:46 executing program 1: semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000140)=""/4096) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000001400)=""/109) 23:17:46 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @dev}, {}, 0x42, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'veth0_to_team\x00'}) 23:17:46 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x4020940d, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @broadcast}, 'vlan1\x00'}) 23:17:46 executing program 5: syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='timerslack_ns\x00') mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 23:17:46 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="5a6a57ddde345bf06f42cb7185a88d2a035bdbff1ab86212c3015d3f5c9a20232d443ea273785f24", 0x28}], 0x1}}], 0x1, 0xffd8) [ 2890.235653][T12737] bridge0: port 3(gretap0) entered disabled state 23:17:46 executing program 4: prctl$PR_SET_MM(0x23, 0xc, &(0x7f0000ffd000/0x1000)=nil) 23:17:46 executing program 2: pselect6(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)={&(0x7f0000000180)={[0x3]}, 0x8}) 23:17:46 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x8995, &(0x7f0000000140)={'sit0\x00', 0x0}) 23:17:46 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="5a6a57ddde345bf06f42cb7185a88d2a035bdbff1ab86212c3015d3f5c9a20232d443ea273785f24", 0x28}], 0x1}}], 0x1, 0xffd8) [ 2890.379007][ T7472] kernel write not supported for file /12744/timerslack_ns (pid: 7472 comm: kworker/1:4) 23:17:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x1d, 0x0, 0x0) [ 2890.432411][T12737] bridge0: port 2(bridge_slave_1) entered disabled state [ 2890.439551][T12737] bridge0: port 1(bridge_slave_0) entered disabled state [ 2890.728042][T12737] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2890.757612][T12737] batman_adv: batadv0: Interface deactivated: batadv_slave_1 23:17:46 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000200)=0x8, 0x4) 23:17:46 executing program 2: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x0, 0x989680}, 0x0) 23:17:46 executing program 4: clock_getres(0x3, &(0x7f0000000580)) 23:17:46 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="5a6a57ddde345bf06f42cb7185a88d2a035bdbff1ab86212c3015d3f5c9a20232d443ea273785f24", 0x28}], 0x1}}], 0x1, 0xffd8) 23:17:46 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @dev}, {}, 0x3c, {0x2, 0x0, @broadcast}, 'veth1_to_hsr\x00'}) 23:17:46 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/118) 23:17:47 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="5a6a57ddde345bf06f42cb7185a88d2a035bdbff1ab86212c3015d3f5c9a20232d443ea273785f24", 0x28}], 0x1}}], 0x1, 0xffd8) 23:17:47 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0xf4, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) 23:17:47 executing program 1: syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x488003) 23:17:47 executing program 2: msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, 0x0) r0 = msgget(0x1, 0x44) msgctl$IPC_RMID(r0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000002100)=""/170) r1 = msgget$private(0x0, 0x0) r2 = msgget(0x2, 0x401) msgsnd(r2, &(0x7f00000021c0)={0x3, "ac5b673bd5118b0474092c83a42a1ea7f0911718abf22b5385f44a2d9f6101989402b4e1b833d260c081d3f9de5dbfe07d029314753d7fac2eca04ec673c908e2372d5737b6d577c29e0c4b2c86600f55d99b40f3bbcb258c6acdd8cc91820eafd5be5373ad43df4179ab83697166f2a29a29cc1f79584ca3b1f335c1b13d8178676c594779b05f2f311716dd6972797459861ef751f4849c95bf127f534bf4cded43e38627f9beafb1b4bae30a7553547e4f141f27d86267b06ce597c773489ca56ab662a9900b7e7a9976e5533c4eda413518bd2a4bbb7eff266df41da4568c797383dc26aa551ef1fee33a78d4cc3183e34894ca3deb18d75e0e8bee850bc7152d18258f7cc44dc43891f4b842bf6d81528aae28e363567be7c245c8bef12f05e72a1d6a1d23936c41452713452283d32341a742c8ce18690df62641785ba666e9b3eaea566a5527256047f00aba63376260749badb851fc7be24a842a6b604e22090eb277cc0cee1621b756ec43c2cb2981bff5d39e432697ddb9224e259ba30189021ddaa2d3519e47e471913de6942bedf2da21a85daee9f5e0f330b107055253feeb7b468feaca493da6ca4e0a0bb958e85666d1fa9812306c25cec7f6d0de55ef1426775cab4bc67de92070e7161483611fd380a5c57968d6cf0c4bde931f8db6c49075a28333feea8d6b02efe4d721fb3516974894aac8f7276d62e1d2c4923596e8ce115b4714be41c2ab3dcb34e287ec07eba177eadbf0ef65a21963328c777b1b4e6a0b291530276f6e62498923891df4347c310f2de90f0ef88cdbd27188e48c5e1831d4e0ce93604f29488f2df747e27d709b1b60ecb77d458029ab1fc19d4be4f8f4b4a634fc6e997471cfacb83177b02b4180e017d7606593ee094504fd1bef96505625b395205605c4e448dcda089d9f739064cbad8a737513fb6394c851f44669ea167c4102968a9256561fba00f7b15db396eacfa56a23b85f2cf63c25b84ba62b8bb1c318616220aceddf3750da395fd11d77bb7aa8d8537f6c0d217ef2b1bcec46d25938709554b216dfab493d1b51a5b342268238e023d86d59f4f3b6490d5f9dc36c8ab1d120f6d3ba0e09508e7e40eedc219a5f40a871979c27e776563aeed02f3d3e4ff34e7bffb6b3368a4d80791d22d48dfbd7d5cd655a337303366b143996bdcb307c6024673bb6df9525763050cf53af37545660b4bd641c3041b93d00192f76eac6e2b44948a4f0a250e0c70a7ef3ed9daf6babdd16d5551b1c7c96b8036cf9e438c72fa087cdcb345894568c673bf0c6bcef78df3323445dc4c4d3e864c667fdbad7746fff3270b3e0b25c349aa6bc62d4bc9b550897861dd5c77f7aedc70378355d3a1f12d9ca78dee373e4adfff8a41463a9bf0ba9ea242bd7a7b59f08f9513d043162462ec9cc91abb2cd4a030a4f85f7b8a0f25af1d917d59ad35a0c748c34997cc0b3b0d6ee4e6b3dbbb382348192af86d5e7d085560bca34bec80ca27175653be2b76fa88d4bcfa3c59f2b790cd302cc32b45728d90d817f53aa9dd76de0bf07c8aa60cabba7d1340b610420ad1340f25a0e2474e0f07c8afe92920eecf29938e890b54fbda83c852dff8ed1804e097f2bc453f35abd89f5f721de525fd7288f34fb0b19d14c1b9a7fb7026586c01b38b895041bd3662d85252fd77b1a1f4c1d602725a0b4f8d025c0afe20be81765e7460d4b2779a8a5689121094030e4a46953968047a15f66b787424e2c97563e923f1c3eb960d925193779ce55fe68f8bc8689044789a7bc3c6363298c6e652877d63a982310368bb23f0e4c9994d1dc4dc85b0342a326db6c75a2ff76a84493c6630ce969128479e6ef8edbf396a23f9d561d48aaceb5dce7bc7a42a57ac4e4d1390426626a4a2816861ed7ac1e618519abee0d84343ab334c17a2cd6c781b91c61cd9e2713b8f77ef777fbc5f1de0a24bc680784f36f315b57102cf15f857430c510883ba5f8970cb46b2dcec4dec9f935defade40eb269728dbbfda3a35a49dd9686e0e403c5055313d8242d1e6e482646f64a94149967e4478cf0edf707ff0cad43355f27e25e04ee016ccd2dadbaf2ffafdfd886a6fafd7851e96ef9c80817038eb9b541df61ebae44c32655e85ef2a0cd77312052fb180636a9502ede1d7efa9dd621c4e8ba49139cb173735e9987708bb4c03d282b05cd5caaf7e417d31566fe111286aa6465a4ca677abf58ea2e93cc7524806085e84ef778017fa5bee9900077cd6966d9286b56393e28f06571767ddf30415fcf56089191732161a361bf6dfe6ac19c5968eddfeb90b510e89c022948c757ee6b33289ac7d58a154e00c9ced6d80cd93f02363c2ae66b4c166f834c9158775ac5cabefe43aa1c7aafcbd8d07c3ebc26a7a31c6a31dbae94d6d384a2319a621606bb6355e3f6622e94e8098d455a9bdd49510e677ac0178a968918023f0fe2ef353dfcdc1a71adc49f77383fe58bb025056d1b5d76e7e181bb57c7b42bce77fa875d5cd49c30270873e743e28aad93f8a44d157ee84a45efb51ff055a926aec744c447335b33e9d2d3f95c22024f4b93b13d16615fb8412bad0c7d6a782708f122d9898694dcdea97cdbf17f6383b7d1f3fc8433575f910b6d277ad57811492d2c0f5a041d2090af6dc91af8aee298fd82c03ad22adf91e53e2911f49830d77864b398e5496fdaf177186b99bb710ef65d6320e8d432f983ebb0d5537bc236db5506a66093d735b960a6b1ea7335fbf8c226b739bf29c36e146eacb114bfeaf073bf46e9d7aaf73f5af2ac66146c2ad9067e3b1fb401d604795a6982dd7b4db193ba53dd7d73175a97e8919bbc9e9952ba7bf0d9c8685e4d57fd66e523f43e1a98932919001a412a5f52dda8992f937c4e9a368102bb9e6f2fb9de8e769f47faddebd9066bdf5245fb626225b4d0090dcb33c5b40188e0a4c5d2a83bfa88f54691298e00cf58814942b09b3720ba066addd11d4daceac43c9b1ca968b184d5b2e9fa332d84853dae8968c551f63df903763fac0b78907f2a36de54cfb9eb0ac4034f1ce5ca0ff664fba52723061edb3cdd087eff5f08c8c51f0be5e0bd3bd193deac5b99e953d8b86d7cb04c21e5280f03c15de09ebbc79b2ad624901ab595ca4ecbb848ace08b67cfd4dbaa1bd55c4359609e31798cbbdfdb5c1cf52e6c5b950c2e1802f53f17250543293f5ae9558db3c9f77dc4e8bf2dc91a3423f433f95e1d79793384e5e20e192fcde324e01ae6bdb4fe5bf5aeae17fde3f50e43fb469a38b1f0197765e93358394723e8127d904cec5353c6826ae9ce1465a13597c03e4ac80fe025ae4c7f1cfd128ec7abaefbb4ad8705e7b0da3da10a65c70597b58dc83aa6b97dd4f33824dfff3416447d79ffff781c78ca74f2cd7abd6e77a5053ec7be73083e626352249201571e047fbc011ab17c9e0b3aa470790f9f4a0e10fd15678f12dc3db144a0118a4863740dc49063dfb3f87a5f46e0e751295e6a12541f5dc57a012f6b346445cfd273b3b2178a899ee3273dc6ca90e1c873dbf34dc1f6f245e8a1537e32f847f5d7663c62b9f92d17ed35efc202d5da96a50190c4aa93592a8a54faa11fd47b04a758ef2cbc85d4b2395c4754f67cc5e1e1a30ed08da5049dd506ecee090aaa4a097b6ed54c1873d1a41b4e69638dc1bb249f35c3104b9fc9d1c7dedd01d160b02140cfea7bba3ba1d84884fba47c82e3358205c5478eddc6871f29db3a8f7eb3fff699130328febba9741c4323f2026d75d45d3f5a65d805e3fbca0f705530a0723e80b2d0718d7374911e072825cdcefce0134a11e5901a81d51f557d550bb02f5a5179eecf33b53cfda17a4d604a7a3ccd3926f6bec49164383528e8aea5384866576d8894cc683e0b805aa113b81488be7e77b667a76f68f21ea1c16fb704ce92b62f2bca74f2a5f069189e3ddd27b21337d0416554c600400da7307e8526b88a299fc76bf13ac9461c95ccf6f80c1f5cedb97b873d1d5e1ae8af23cb5870fcb700512aee44351761c1ccc965279f7875d603e27b3175c7e432736ea6b701150ef4c376da421d8eba860ca71c0583a4553a2d07f4346f25bd2a9215d4496607159deb83fb8c38bb36ce41d81e848df7fb3c334bb41818330e5e4f9c5c3926558851ee8b46b92ccb6666b4dd84bad2d60afebffd99806d9923de9e2325375b95a78f0fffbe6d950232af5df787bad2b6c70fdf412876ec3210f0d99e2c607e90804ab225f537e00a2ead28f6626c13b0ed6b95344708d4a7a06ed37e341410328d3d3a79d018240d742dc2123a7f574edda3b445925a87cee3a2adb9afc8268b2720fc60a44507be7ba0538818d0ae85229c7ebf24316b3bf9b151f911c5cb7fd30f0544042620449ce0b23f0593cc4cef04c1481c342cd76be0f3c5115bfe05b5d790fc0f921eabb6a73548493d5c02a6d29f56d005cd72885ca6e02321addb9381f6b2dba66dcc6d11210edbb52b0916e62a918799613ea824d74c83698e0865d0884cbe86bd338178c2dd5d185ec68b4b623a2a108af3aa4467853d34dc12a5f4797a393a58b61d1f821aa6096ddd9b6cd69edc85f5b52b0deaec753bbac94fdb12073fe41f614f5413cba19ad652eebfa418fefb1bdcd53d1e7d2603df5231a03c07c1ba7c65c6a796f94b0210f046d84e200aea9af92dcaaa171eebafb1a0569184784796846f5df00e042a04f3c54d16bb2536a940f4a388022d511815dc8f25138b8d6f77bc535364b2254e89fe4bc56cec748e13633ea222f709625e031f2f8cbd0ed91d40847e30a2380e113d8519f551d6935fb95ed7b3ce70f5e62c469a0b480bce148e1e289cd92f400ac94dfc7ef0f80487b41c35ed664bb1e20a681019d6bdb1c3ff75ee3d7322e103df69b3047d344da165f5e669945f2e6dbb4ec23c7c489f447ab6ec838ac0d9314dd2fb6eaea86016e1af3456640c10827a86f0d12a14412b836ce508710332b5068326c72057182ec09ff07005c8f05ea3dd4bebd22bc68242891ba337f8d9e951f09ed6872f539f4364cbbc31a798b77f55d70d8d9fedcca98bc131d2f1a276c17f98bafa657aa67548fc1d6e82bb843d78730cf20640d8ee1c99eb6e4001068172c46c1b5f350fe590d28778c258dbc738c59585108203402550dda14f584001b865c2e644dcbcc0ee3e2ef8c8c4353239e6be3a59950eff0de6ef847cf51882ab05bf3cb347c8c6e0183962a4af1419ce9101a4103da068675c3a803298a1e7ccb02c4d02941ca3f33aff98722897db6f66c3969ce004489b3e30a7f162d4405aa593424aba27a0209710a5389c6cb24385d7141c74ce2802bd0f0b90162769a517776b8c53e9505ab86871000b97868ed0e54ddd8b9aa6827c4e88648e7baa061776fc5c1e71c6aa0e59d8140b7eddca6bd710e0e670bec57f71c59e85332455f4b393825519d99378376c8cbbf151d387d79e1ac7cafa89149eb744d5a944e29072070de315160d99bfee4e9232a6bd79862797c5fbb77c891e8a88b29eb41559cf801f09b0cdea3d6fc95001f896933cdd0a7cc94c1ab0fc4258fcbc898249f40cf4e49a89b1880f13409c92d1a7a7be904dab2b031b1945ca5fb02dad60df3b7e753223a0de0b895344e3919bc117586d3b2720d4a12123dc38a683651cf465b79929fb99621f4f0ca09dd78e1bda66ed9f115e4946c9bd703fe64266b9afc176cf18a428eb5def245bbd72208f79bfed351c4f535f3f972c8b5304eb0039934e1a9b7ef18f8dec"}, 0x1008, 0x0) r3 = msgget(0x0, 0x0) msgrcv(r3, 0x0, 0x3f, 0x2, 0x3000) socket$vsock_stream(0x28, 0x1, 0x0) r4 = msgget$private(0x0, 0x18) msgctl$IPC_STAT(r4, 0x2, &(0x7f00000020c0)=""/52) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/4096) getpid() msgctl$IPC_INFO(r0, 0x3, &(0x7f00000010c0)=""/4096) [ 2891.116130][T12739] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.3'. 23:17:47 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x40049409, 0x0) 23:17:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f00000001c0), 0x8) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000080), 0x0) 23:17:47 executing program 0: r0 = socket$inet6(0xa, 0x0, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="5a6a57ddde345bf06f42cb7185a88d2a035bdbff1ab86212c3015d3f5c9a20232d443ea273785f24", 0x28}], 0x1}}], 0x1, 0xffd8) 23:17:47 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) 23:17:47 executing program 4: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000380)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000280)="b5", 0x1}, 0x68) 23:17:47 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x8930, &(0x7f0000000140)={'sit0\x00', 0x0}) 23:17:47 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8919, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @broadcast}, 'vlan1\x00'}) 23:17:47 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0xc020660b, 0x0) 23:17:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0xfffffffffffffe6d) 23:17:47 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8917, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @broadcast}, 'vlan1\x00'}) 23:17:47 executing program 2: pipe2$9p(&(0x7f0000000100), 0x0) 23:17:47 executing program 0: r0 = socket$inet6(0xa, 0x0, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="5a6a57ddde345bf06f42cb7185a88d2a035bdbff1ab86212c3015d3f5c9a20232d443ea273785f24", 0x28}], 0x1}}], 0x1, 0xffd8) 23:17:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000006c0)={0x14}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 23:17:47 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14, 0x0, 0x61ae44adee005a37}, 0x14}}, 0x0) 23:17:47 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x890d, 0x0) 23:17:47 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb}, 0x48) 23:17:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) getsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) 23:17:47 executing program 0: r0 = socket$inet6(0xa, 0x0, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="5a6a57ddde345bf06f42cb7185a88d2a035bdbff1ab86212c3015d3f5c9a20232d443ea273785f24", 0x28}], 0x1}}], 0x1, 0xffd8) 23:17:47 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl2\x00', r2, 0x2f, 0x20, 0x1f, 0x1, 0x8, @mcast1, @private1, 0x7800, 0x10, 0x10000, 0x6072}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000000)={'syztnl1\x00', &(0x7f0000000100)={'ip6gre0\x00', r2, 0x29, 0x6, 0x7, 0x10000, 0x47, @mcast1, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x7, 0x810f, 0x3f, 0x3}}) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f00000003c0)=0x20, 0x4) pipe2$watch_queue(&(0x7f0000000380), 0x80) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'ip6_vti0\x00', r2, 0x2f, 0x81, 0xa8, 0x5, 0x4, @local, @mcast1, 0x20, 0x40, 0x9, 0xb9}}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000140)={'sit0\x00', 0x0}) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000000)={'syztnl2\x00', &(0x7f0000000100)={'ip6gre0\x00', r4, 0x29, 0x6, 0x7, 0x10000, 0x47, @mcast1, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x7, 0x810f, 0x3f, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r3, 0x89f6, &(0x7f0000000480)={'ip6_vti0\x00', &(0x7f0000000400)={'syztnl2\x00', r4, 0x4, 0xa8, 0x1, 0x20, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @empty, 0x700, 0x20, 0x1000, 0x5}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x2f, 0x1, 0x40, 0x245, 0x0, @dev={0xfe, 0x80, '\x00', 0x18}, @empty, 0x40, 0x80, 0x4, 0x70a}}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000340)={'syztnl2\x00', &(0x7f00000002c0)={'syztnl0\x00', r5, 0x2f, 0x8d, 0x6d, 0x1f, 0x10, @mcast2, @mcast2, 0x20, 0x40, 0x8001, 0x7}}) 23:17:47 executing program 5: r0 = semget$private(0x0, 0x1, 0x490) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000040)) 23:17:47 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x891c, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @broadcast}, 'vlan1\x00'}) 23:17:47 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) 23:17:47 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x3c0, 0xffffffff, 0xd0, 0x208, 0x208, 0xffffffff, 0xffffffff, 0x2f0, 0x2f0, 0x2f0, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@private0, @private0, [], [], 'nr0\x00', 'syz_tun\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE3={0x28}}, {{@ipv6={@empty, @private0, [], [], 'ipvlan0\x00', 'veth0\x00'}, 0x0, 0xd8, 0x138, 0x0, {}, [@common=@inet=@udp={{0x30}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@local}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "519f43309150e8bde26b48f2a7672a07551d23927a92d0c61e44cc9ac8f2"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x420) 23:17:47 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="5a6a57ddde345bf06f42cb7185a88d2a035bdbff1ab86212c3015d3f5c9a20232d443ea273785f24", 0x28}], 0x1}}], 0x1, 0xffd8) 23:17:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x19, 0x0, 0x0) 23:17:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000006c0)={0x14}, 0x14}}, 0x0) 23:17:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x49, 0x0, 0x0) 23:17:47 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='./file0\x00', 0x0, 0x7400, 0x0) syz_mount_image$ext4(&(0x7f00000005c0)='ext2\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0xa0022, &(0x7f00000019c0)={[{@journal_dev}]}) 23:17:47 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x401c5820, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @broadcast}, 'vlan1\x00'}) 23:17:47 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c1d42, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000100)=0x0) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADLINK(r3, &(0x7f0000000040)={0x14, 0x17, 0x0, {0xb, './bus/file0'}}, 0x14) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x3a5, 0x2, 0x1, 0x0, r1, &(0x7f0000000140)="04", 0x1, 0x7000000}]) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 23:17:47 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="5a6a57ddde345bf06f42cb7185a88d2a035bdbff1ab86212c3015d3f5c9a20232d443ea273785f24", 0x28}], 0x1}}], 0x1, 0xffd8) 23:17:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x49, &(0x7f00000001c0), 0x8) 23:17:47 executing program 2: r0 = inotify_init() inotify_add_watch(r0, 0x0, 0x12000020) 23:17:47 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x6, @broadcast}, 0x28, {0x2, 0x0, @broadcast}, 'vlan1\x00'}) 23:17:47 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl2\x00', 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @rand_addr=' \x01\x00'}}) [ 2891.813583][T12859] EXT4-fs: Cannot specify journal on remount 23:17:47 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="5a6a57ddde345bf06f42cb7185a88d2a035bdbff1ab86212c3015d3f5c9a20232d443ea273785f24", 0x28}], 0x1}}], 0x1, 0xffd8) 23:17:47 executing program 5: mprotect(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x2000000) 23:17:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}], 0x1, 0x0, 0x0) 23:17:47 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8934, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @broadcast}, 'vlan1\x00'}) 23:17:47 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x8971, &(0x7f0000000140)={'sit0\x00', 0x0}) 23:17:47 executing program 3: msgsnd(0x0, &(0x7f00000021c0)={0x3, "ac5b673bd5118b0474092c83a42a1ea7f0911718abf22b5385f44a2d9f6101989402b4e1b833d260c081d3f9de5dbfe07d029314753d7fac2eca04ec673c908e2372d5737b6d577c29e0c4b2c86600f55d99b40f3bbcb258c6acdd8cc91820eafd5be5373ad43df4179ab83697166f2a29a29cc1f79584ca3b1f335c1b13d8178676c594779b05f2f311716dd6972797459861ef751f4849c95bf127f534bf4cded43e38627f9beafb1b4bae30a7553547e4f141f27d86267b06ce597c773489ca56ab662a9900b7e7a9976e5533c4eda413518bd2a4bbb7eff266df41da4568c797383dc26aa551ef1fee33a78d4cc3183e34894ca3deb18d75e0e8bee850bc7152d18258f7cc44dc43891f4b842bf6d81528aae28e363567be7c245c8bef12f05e72a1d6a1d23936c41452713452283d32341a742c8ce18690df62641785ba666e9b3eaea566a5527256047f00aba63376260749badb851fc7be24a842a6b604e22090eb277cc0cee1621b756ec43c2cb2981bff5d39e432697ddb9224e259ba30189021ddaa2d3519e47e471913de6942bedf2da21a85daee9f5e0f330b107055253feeb7b468feaca493da6ca4e0a0bb958e85666d1fa9812306c25cec7f6d0de55ef1426775cab4bc67de92070e7161483611fd380a5c57968d6cf0c4bde931f8db6c49075a28333feea8d6b02efe4d721fb3516974894aac8f7276d62e1d2c4923596e8ce115b4714be41c2ab3dcb34e287ec07eba177eadbf0ef65a21963328c777b1b4e6a0b291530276f6e62498923891df4347c310f2de90f0ef88cdbd27188e48c5e1831d4e0ce93604f29488f2df747e27d709b1b60ecb77d458029ab1fc19d4be4f8f4b4a634fc6e997471cfacb83177b02b4180e017d7606593ee094504fd1bef96505625b395205605c4e448dcda089d9f739064cbad8a737513fb6394c851f44669ea167c4102968a9256561fba00f7b15db396eacfa56a23b85f2cf63c25b84ba62b8bb1c318616220aceddf3750da395fd11d77bb7aa8d8537f6c0d217ef2b1bcec46d25938709554b216dfab493d1b51a5b342268238e023d86d59f4f3b6490d5f9dc36c8ab1d120f6d3ba0e09508e7e40eedc219a5f40a871979c27e776563aeed02f3d3e4ff34e7bffb6b3368a4d80791d22d48dfbd7d5cd655a337303366b143996bdcb307c6024673bb6df9525763050cf53af37545660b4bd641c3041b93d00192f76eac6e2b44948a4f0a250e0c70a7ef3ed9daf6babdd16d5551b1c7c96b8036cf9e438c72fa087cdcb345894568c673bf0c6bcef78df3323445dc4c4d3e864c667fdbad7746fff3270b3e0b25c349aa6bc62d4bc9b550897861dd5c77f7aedc70378355d3a1f12d9ca78dee373e4adfff8a41463a9bf0ba9ea242bd7a7b59f08f9513d043162462ec9cc91abb2cd4a030a4f85f7b8a0f25af1d917d59ad35a0c748c34997cc0b3b0d6ee4e6b3dbbb382348192af86d5e7d085560bca34bec80ca27175653be2b76fa88d4bcfa3c59f2b790cd302cc32b45728d90d817f53aa9dd76de0bf07c8aa60cabba7d1340b610420ad1340f25a0e2474e0f07c8afe92920eecf29938e890b54fbda83c852dff8ed1804e097f2bc453f35abd89f5f721de525fd7288f34fb0b19d14c1b9a7fb7026586c01b38b895041bd3662d85252fd77b1a1f4c1d602725a0b4f8d025c0afe20be81765e7460d4b2779a8a5689121094030e4a46953968047a15f66b787424e2c97563e923f1c3eb960d925193779ce55fe68f8bc8689044789a7bc3c6363298c6e652877d63a982310368bb23f0e4c9994d1dc4dc85b0342a326db6c75a2ff76a84493c6630ce969128479e6ef8edbf396a23f9d561d48aaceb5dce7bc7a42a57ac4e4d1390426626a4a2816861ed7ac1e618519abee0d84343ab334c17a2cd6c781b91c61cd9e2713b8f77ef777fbc5f1de0a24bc680784f36f315b57102cf15f857430c510883ba5f8970cb46b2dcec4dec9f935defade40eb269728dbbfda3a35a49dd9686e0e403c5055313d8242d1e6e482646f64a94149967e4478cf0edf707ff0cad43355f27e25e04ee016ccd2dadbaf2ffafdfd886a6fafd7851e96ef9c80817038eb9b541df61ebae44c32655e85ef2a0cd77312052fb180636a9502ede1d7efa9dd621c4e8ba49139cb173735e9987708bb4c03d282b05cd5caaf7e417d31566fe111286aa6465a4ca677abf58ea2e93cc7524806085e84ef778017fa5bee9900077cd6966d9286b56393e28f06571767ddf30415fcf56089191732161a361bf6dfe6ac19c5968eddfeb90b510e89c022948c757ee6b33289ac7d58a154e00c9ced6d80cd93f02363c2ae66b4c166f834c9158775ac5cabefe43aa1c7aafcbd8d07c3ebc26a7a31c6a31dbae94d6d384a2319a621606bb6355e3f6622e94e8098d455a9bdd49510e677ac0178a968918023f0fe2ef353dfcdc1a71adc49f77383fe58bb025056d1b5d76e7e181bb57c7b42bce77fa875d5cd49c30270873e743e28aad93f8a44d157ee84a45efb51ff055a926aec744c447335b33e9d2d3f95c22024f4b93b13d16615fb8412bad0c7d6a782708f122d9898694dcdea97cdbf17f6383b7d1f3fc8433575f910b6d277ad57811492d2c0f5a041d2090af6dc91af8aee298fd82c03ad22adf91e53e2911f49830d77864b398e5496fdaf177186b99bb710ef65d6320e8d432f983ebb0d5537bc236db5506a66093d735b960a6b1ea7335fbf8c226b739bf29c36e146eacb114bfeaf073bf46e9d7aaf73f5af2ac66146c2ad9067e3b1fb401d604795a6982dd7b4db193ba53dd7d73175a97e8919bbc9e9952ba7bf0d9c8685e4d57fd66e523f43e1a98932919001a412a5f52dda8992f937c4e9a368102bb9e6f2fb9de8e769f47faddebd9066bdf5245fb626225b4d0090dcb33c5b40188e0a4c5d2a83bfa88f54691298e00cf58814942b09b3720ba066addd11d4daceac43c9b1ca968b184d5b2e9fa332d84853dae8968c551f63df903763fac0b78907f2a36de54cfb9eb0ac4034f1ce5ca0ff664fba52723061edb3cdd087eff5f08c8c51f0be5e0bd3bd193deac5b99e953d8b86d7cb04c21e5280f03c15de09ebbc79b2ad624901ab595ca4ecbb848ace08b67cfd4dbaa1bd55c4359609e31798cbbdfdb5c1cf52e6c5b950c2e1802f53f17250543293f5ae9558db3c9f77dc4e8bf2dc91a3423f433f95e1d79793384e5e20e192fcde324e01ae6bdb4fe5bf5aeae17fde3f50e43fb469a38b1f0197765e93358394723e8127d904cec5353c6826ae9ce1465a13597c03e4ac80fe025ae4c7f1cfd128ec7abaefbb4ad8705e7b0da3da10a65c70597b58dc83aa6b97dd4f33824dfff3416447d79ffff781c78ca74f2cd7abd6e77a5053ec7be73083e626352249201571e047fbc011ab17c9e0b3aa470790f9f4a0e10fd15678f12dc3db144a0118a4863740dc49063dfb3f87a5f46e0e751295e6a12541f5dc57a012f6b346445cfd273b3b2178a899ee3273dc6ca90e1c873dbf34dc1f6f245e8a1537e32f847f5d7663c62b9f92d17ed35efc202d5da96a50190c4aa93592a8a54faa11fd47b04a758ef2cbc85d4b2395c4754f67cc5e1e1a30ed08da5049dd506ecee090aaa4a097b6ed54c1873d1a41b4e69638dc1bb249f35c3104b9fc9d1c7dedd01d160b02140cfea7bba3ba1d84884fba47c82e3358205c5478eddc6871f29db3a8f7eb3fff699130328febba9741c4323f2026d75d45d3f5a65d805e3fbca0f705530a0723e80b2d0718d7374911e072825cdcefce0134a11e5901a81d51f557d550bb02f5a5179eecf33b53cfda17a4d604a7a3ccd3926f6bec49164383528e8aea5384866576d8894cc683e0b805aa113b81488be7e77b667a76f68f21ea1c16fb704ce92b62f2bca74f2a5f069189e3ddd27b21337d0416554c600400da7307e8526b88a299fc76bf13ac9461c95ccf6f80c1f5cedb97b873d1d5e1ae8af23cb5870fcb700512aee44351761c1ccc965279f7875d603e27b3175c7e432736ea6b701150ef4c376da421d8eba860ca71c0583a4553a2d07f4346f25bd2a9215d4496607159deb83fb8c38bb36ce41d81e848df7fb3c334bb41818330e5e4f9c5c3926558851ee8b46b92ccb6666b4dd84bad2d60afebffd99806d9923de9e2325375b95a78f0fffbe6d950232af5df787bad2b6c70fdf412876ec3210f0d99e2c607e90804ab225f537e00a2ead28f6626c13b0ed6b95344708d4a7a06ed37e341410328d3d3a79d018240d742dc2123a7f574edda3b445925a87cee3a2adb9afc8268b2720fc60a44507be7ba0538818d0ae85229c7ebf24316b3bf9b151f911c5cb7fd30f0544042620449ce0b23f0593cc4cef04c1481c342cd76be0f3c5115bfe05b5d790fc0f921eabb6a73548493d5c02a6d29f56d005cd72885ca6e02321addb9381f6b2dba66dcc6d11210edbb52b0916e62a918799613ea824d74c83698e0865d0884cbe86bd338178c2dd5d185ec68b4b623a2a108af3aa4467853d34dc12a5f4797a393a58b61d1f821aa6096ddd9b6cd69edc85f5b52b0deaec753bbac94fdb12073fe41f614f5413cba19ad652eebfa418fefb1bdcd53d1e7d2603df5231a03c07c1ba7c65c6a796f94b0210f046d84e200aea9af92dcaaa171eebafb1a0569184784796846f5df00e042a04f3c54d16bb2536a940f4a388022d511815dc8f25138b8d6f77bc535364b2254e89fe4bc56cec748e13633ea222f709625e031f2f8cbd0ed91d40847e30a2380e113d8519f551d6935fb95ed7b3ce70f5e62c469a0b480bce148e1e289cd92f400ac94dfc7ef0f80487b41c35ed664bb1e20a681019d6bdb1c3ff75ee3d7322e103df69b3047d344da165f5e669945f2e6dbb4ec23c7c489f447ab6ec838ac0d9314dd2fb6eaea86016e1af3456640c10827a86f0d12a14412b836ce508710332b5068326c72057182ec09ff07005c8f05ea3dd4bebd22bc68242891ba337f8d9e951f09ed6872f539f4364cbbc31a798b77f55d70d8d9fedcca98bc131d2f1a276c17f98bafa657aa67548fc1d6e82bb843d78730cf20640d8ee1c99eb6e4001068172c46c1b5f350fe590d28778c258dbc738c59585108203402550dda14f584001b865c2e644dcbcc0ee3e2ef8c8c4353239e6be3a59950eff0de6ef847cf51882ab05bf3cb347c8c6e0183962a4af1419ce9101a4103da068675c3a803298a1e7ccb02c4d02941ca3f33aff98722897db6f66c3969ce004489b3e30a7f162d4405aa593424aba27a0209710a5389c6cb24385d7141c74ce2802bd0f0b90162769a517776b8c53e9505ab86871000b97868ed0e54ddd8b9aa6827c4e88648e7baa061776fc5c1e71c6aa0e59d8140b7eddca6bd710e0e670bec57f71c59e85332455f4b393825519d99378376c8cbbf151d387d79e1ac7cafa89149eb744d5a944e29072070de315160d99bfee4e9232a6bd79862797c5fbb77c891e8a88b29eb41559cf801f09b0cdea3d6fc95001f896933cdd0a7cc94c1ab0fc4258fcbc898249f40cf4e49a89b1880f13409c92d1a7a7be904dab2b031b1945ca5fb02dad60df3b7e753223a0de0b895344e3919bc117586d3b2720d4a12123dc38a683651cf465b79929fb99621f4f0ca09dd78e1bda66ed"}, 0xfd1, 0x0) 23:17:47 executing program 2: msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/106) 23:17:47 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000400)) 23:17:47 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="5a6a57ddde345bf06f42cb7185a88d2a035bdbff1ab86212c3015d3f5c9a20232d443ea273785f24", 0x28}], 0x1}}], 0x1, 0xffd8) 23:17:47 executing program 4: mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2) 23:17:47 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @random="97b4ea9b34e2"}, 0x0, {0x2, 0x0, @local}, 'tunl0\x00'}) 23:17:47 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) 23:17:47 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="5a6a57ddde345bf06f42cb7185a88d2a035bdbff1ab86212c3015d3f5c9a20232d443ea273785f24", 0x28}], 0x1}}], 0x1, 0xffd8) 23:17:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x48, &(0x7f00000001c0), 0x8) 23:17:47 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @broadcast}, 'vlan1\x00'}) 23:17:48 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8907, 0x0) 23:17:48 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="5a6a57ddde345bf06f42cb7185a88d2a035bdbff1ab86212c3015d3f5c9a20232d443ea273785f24", 0x28}], 0x1}}], 0x1, 0xffd8) 23:17:48 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_opts(r0, 0x0, 0x9, 0x0, &(0x7f00000002c0)) 23:17:48 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x29, 0x0, 0x810) 23:17:48 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, 0x0, &(0x7f0000000080)) 23:17:48 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x2d, 0x0, 0x810) 23:17:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x4a, &(0x7f00000001c0), 0x8) 23:17:48 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="5a6a57ddde345bf06f42cb7185a88d2a035bdbff1ab86212c3015d3f5c9a20232d443ea273785f24", 0x28}], 0x1}}], 0x1, 0xffd8) 23:17:48 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000002c0)={'ip6tnl0\x00', &(0x7f0000000240)={'ip6tnl0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast1}}) 23:17:48 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x1600bd7d, 0x0, 0x810) 23:17:48 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 23:17:48 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="5a6a57ddde345bf06f42cb7185a88d2a035bdbff1ab86212c3015d3f5c9a20232d443ea273785f24", 0x28}], 0x1}}], 0x1, 0xffd8) 23:17:48 executing program 4: add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$search(0xa, 0x0, &(0x7f0000000800)='encrypted\x00', 0x0, 0x0) 23:17:48 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x0, 0x0, 0x0, 0x0, 0x785, 0x1}, 0x48) 23:17:48 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x8970, &(0x7f0000000140)={'sit0\x00', 0x0}) 23:17:48 executing program 2: r0 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000740)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x1c, r0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x1c}}, 0x0) 23:17:48 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="5a6a57ddde345bf06f42cb7185a88d2a035bdbff1ab86212c3015d3f5c9a20232d443ea273785f24", 0x28}], 0x1}}], 0x1, 0xffd8) 23:17:48 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000180), 0x4) 23:17:48 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x6, @broadcast}, 0x28, {0x2, 0x0, @broadcast}, 'vlan1\x00'}) 23:17:48 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @empty}, 0x1c) 23:17:49 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x8931, &(0x7f0000000140)={'sit0\x00', 0x0}) 23:17:49 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x4020940d, &(0x7f0000000140)={'sit0\x00', 0x0}) 23:17:49 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f00000009c0)={0x2, 0x4e24, @dev}, 0x10) 23:17:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) ftruncate(0xffffffffffffffff, 0x0) ftruncate(r0, 0x48280) io_submit(r1, 0x20000000000001cb, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc000}]) 23:17:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="5a6a57ddde345bf06f42cb7185a88d2a035bdbff1ab86212c3015d3f5c9a20232d443ea273785f24", 0x28}], 0x1}}], 0x1, 0xffd8) 23:17:49 executing program 3: add_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000200)="edb9eeeee8d6bfd9856b5678b53a4410c7d72ef00fa4f163d7bbe13f6a14037d9229a913753e9b79088eb93b990b626af2309edd270c90c63d741892b52798d5b3a9666578480703a962cb2fd2f2eaed112eeb844fd70e224083a3474461bbbaed53b544222dd14889f24c9140f765936cb5f7201dd2", 0x76, 0xfffffffffffffffe) [ 2893.224824][ T24] audit: type=1400 audit(1652311069.060:645): avc: denied { name_bind } for pid=12947 comm="syz-executor.3" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 23:17:49 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x30, 0x0, 0x810) 23:17:49 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) 23:17:49 executing program 2: open(&(0x7f0000000080)='./bus\x00', 0x1c1d42, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 23:17:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="5a6a57ddde345bf06f42cb7185a88d2a035bdbff1ab86212c3015d3f5c9a20232d443ea273785f24", 0x28}], 0x1}}], 0x1, 0xffd8) 23:17:49 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) 23:17:49 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8916, 0x0) 23:17:49 executing program 4: keyctl$restrict_keyring(0x1d, 0xfffffffffffffffb, &(0x7f0000000180)='rxrpc_s\x00', 0x0) 23:17:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="5a6a57ddde345bf06f42cb7185a88d2a035bdbff1ab86212c3015d3f5c9a20232d443ea273785f24", 0x28}], 0x1}}], 0x1, 0xffd8) 23:17:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x18, &(0x7f00000001c0), 0x8) 23:17:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) 23:17:49 executing program 3: mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000000), 0x6fb, 0x0) 23:17:49 executing program 5: add_key(&(0x7f0000000000)='.request_key_auth\x00', 0x0, 0x0, 0x0, 0x0) 23:17:49 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x28, {0x2, 0x0, @broadcast}, 'vlan1\x00'}) 23:17:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, 0x0, 0x0, 0xffd8) 23:17:49 executing program 2: setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, 0x0, 0x0) [ 2893.521567][ T24] audit: type=1400 audit(1652311069.360:646): avc: denied { setattr } for pid=12972 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 23:17:49 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x8920, &(0x7f0000000140)={'sit0\x00', 0x0}) 23:17:49 executing program 1: add_key$keyring(&(0x7f0000000300), 0x0, 0x0, 0x0, 0xfffffffffffffffa) 23:17:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000100)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}]}, 0x4c}}, 0x0) 23:17:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, 0x0, 0x0, 0xffd8) 23:17:49 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x28, {0x2, 0x0, @broadcast}, 'vlan1\x00'}) 23:17:49 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) 23:17:49 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x84, 0x80, 0x0, 0x810) 23:17:49 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f00000003c0), 0x4) 23:17:49 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x28, {0x2, 0x0, @broadcast}, 'vlan1\x00'}) 23:17:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, 0x0, 0x0, 0xffd8) 23:17:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x10, 0x0, 0x0) 23:17:49 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) msgrcv(0x0, 0x0, 0x3f, 0x1, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x1, "5ac57ac66f7e38151851dec544dc014c59ae5bc0d1a2340d8956637dea5f2f880b1001544da9009fe56c88e0794634fe6b29da57b36e896a8cb560193caa293636bd6e5b6b3b56083b3fa1e29445cc07964583569b28907d7ceed819"}, 0x64, 0x0) 23:17:49 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x5452, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @broadcast}, 'vlan1\x00'}) 23:17:49 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000000)={0x621, {{0x2, 0x0, @multicast2}}}, 0x90) 23:17:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001d00), 0x0, 0xffd8) 23:17:49 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x28, {0x2, 0x0, @broadcast}, 'vlan1\x00'}) 23:17:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast2}, &(0x7f0000000040)=0x20) 23:17:49 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x8949, &(0x7f0000000140)={'sit0\x00', 0x0}) 23:17:49 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @private2, @private1}}) 23:17:49 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:17:49 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) 23:17:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001d00), 0x0, 0xffd8) 23:17:49 executing program 4: ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x28, {0x2, 0x0, @broadcast}, 'vlan1\x00'}) 23:17:49 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8912, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @broadcast}, 'vlan1\x00'}) 23:17:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x14) 23:17:49 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast1}}, 0x0, 0x1, [{{0x2, 0x0, @private}}]}, 0x110) 23:17:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001d00), 0x0, 0xffd8) 23:17:49 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='tracefs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') umount2(&(0x7f0000000040)='.\x00', 0x3) 23:17:49 executing program 4: ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x28, {0x2, 0x0, @broadcast}, 'vlan1\x00'}) 23:17:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = socket(0x1, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x9, &(0x7f0000000000), 0x20000000) 23:17:49 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x8924, &(0x7f0000000140)={'sit0\x00', 0x0}) 23:17:50 executing program 5: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001200)={&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0}, 0x68) 23:17:50 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0xffd8) 23:17:50 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='tracefs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') umount2(&(0x7f0000000040)='.\x00', 0x3) [ 2894.200635][ T24] audit: type=1400 audit(1652311070.040:647): avc: denied { mount } for pid=13044 comm="syz-executor.1" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 2894.223657][ T24] audit: type=1400 audit(1652311070.040:648): avc: denied { search } for pid=13044 comm="syz-executor.1" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=dir permissive=1 23:17:50 executing program 4: ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x28, {0x2, 0x0, @broadcast}, 'vlan1\x00'}) [ 2894.245874][ T24] audit: type=1400 audit(1652311070.040:649): avc: denied { unmount } for pid=13044 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 23:17:50 executing program 3: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/177) 23:17:50 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 23:17:50 executing program 2: add_key(&(0x7f00000000c0)='id_legacy\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) 23:17:50 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0xffd8) 23:17:50 executing program 4: r0 = socket$inet_sctp(0x2, 0x0, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x28, {0x2, 0x0, @broadcast}, 'vlan1\x00'}) 23:17:50 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89a2, &(0x7f0000000140)={'sit0\x00', 0x0}) 23:17:50 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x8400, 0x80, 0x0, 0x810) 23:17:50 executing program 5: syz_genetlink_get_family_id$batadv(&(0x7f0000000000), 0xffffffffffffffff) shmat(0x0, &(0x7f0000fff000/0x1000)=nil, 0x0) 23:17:50 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0xffd8) 23:17:50 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c40)={0x11, 0x3, &(0x7f0000000ac0)=@framed, &(0x7f0000000b40)='GPL\x00', 0x0, 0x3e, &(0x7f0000000b80)=""/62, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:17:50 executing program 4: r0 = socket$inet_sctp(0x2, 0x0, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x28, {0x2, 0x0, @broadcast}, 'vlan1\x00'}) 23:17:50 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000140)=@req={0x2, 0x1}, 0x10) 23:17:50 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x200300, 0x0) syz_extract_tcp_res(&(0x7f0000000040)={0x41424344, 0x41424344}, 0x4, 0xfb) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) syz_extract_tcp_res(&(0x7f00000000c0)={0x41424344, 0x41424344}, 0x80c2, 0x1) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f00000003c0)=""/169) write$tun(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="40e401160064000005069078ac1ed9a420c200019589086748700256c6070f2800ac1414bba6137a030101010a010102ff01000000000000004e214e20e41153e9111a3d7273b05c912db55c4307af84cf9e928487a15eb4c6b21e4fc86893ed0700a07227af2bcdc04cae4f30644a3949dd06f8f0f24eb28188a6fbc4631e00d47a623bb9125ed090066597493e2224fbcf01ec96b5d76fd382291976fae3c7274c84ba972d53bee650b1cdda39f86dbfc968f13c1a7605755ef531e3c0e2274ad4bb5b6742dc0303ba3373ada40c5b6933ba", @ANYRES32=r1, @ANYRES32=r3, @ANYBLOB="d12004009078000601030b082db8c0b4afde99c902040300fe0ff98974bb3834a7d23a443ec2d700c9e82b8a2560b825be3b5838c088e17a908c55689630db002201579da96f7706a112e8d092e07fe88f2fb75208d0841659bf602ad7c964a02d58531834f82a84d4c67b236662f55c05b5b2e85c5aff64cc3d6393c496ec60b996a257b8db943729d61fcc87389d5c613a36c55d285d4ecef4f2d0dec2d11ff6283ea332437bc0e85d39d23edd8108d2d40e3dafcd87480f2a174275acdac0c80df8e20fbdb014c226"], 0x116) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000480)={0x0, {}, 0x0, {}, 0xfffffff8, 0x0, 0x4013, 0x14, "09411bb6f8e4dbe35b15db9d959191b5688e0e15dc90d7937b61df9d573e14a7ef59720dd9bb75a7369ed47ec292c2e4e45bc1135fe14177019ae0b1193c725e", "192c71ffff4f1804f9f6ddd36ff79f558a6b76a8c7af2910f0ae00", [0x6, 0x23ffffffc]}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000000)={'syztnl2\x00', &(0x7f0000000100)={'ip6gre0\x00', r2, 0x29, 0x6, 0x7, 0x10000, 0x47, @mcast1, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x7, 0x810f, 0x3f, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000200)={'syztnl0\x00', r5, 0x0, 0x1, 0x40, 0x1, 0x4, @local, @ipv4={'\x00', '\xff\xff', @empty}, 0x7, 0x80, 0x72a, 0x2}}) shmget$private(0x0, 0x4000, 0x1000, &(0x7f0000ff9000/0x4000)=nil) 23:17:50 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, 0x0) 23:17:50 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)}}], 0x1, 0xffd8) 23:17:50 executing program 2: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000040)={0x14, 0x17, 0x0, {0xb, './bus/file0'}}, 0x14) 23:17:50 executing program 4: r0 = socket$inet_sctp(0x2, 0x0, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x28, {0x2, 0x0, @broadcast}, 'vlan1\x00'}) 23:17:50 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x8932, &(0x7f0000000140)={'sit0\x00', 0x0}) 23:17:50 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010500)="ff030000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011700)="ed8100000a000000ddf4655fddf4655fddf4655f00000000000001", 0x1b, 0x2200}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531", 0x49, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a090000000000060000000000000005", 0x1d, 0x10000}, {&(0x7f0000000140)="e4b100000000800000a6009a7245c42c20", 0x11, 0x11400}], 0x0, &(0x7f0000013b00)) unlink(0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(r0, &(0x7f0000000080)='./file1\x00', 0x0, r2, 0x0) 23:17:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0xb, 0x0, 0x0) 23:17:50 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)}}], 0x1, 0xffd8) 23:17:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x11, 0x0, 0x0) 23:17:50 executing program 1: shmget$private(0x0, 0x4000, 0xe00, &(0x7f0000ffc000/0x4000)=nil) 23:17:50 executing program 4: socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x28, {0x2, 0x0, @broadcast}, 'vlan1\x00'}) [ 2894.792272][T13107] loop3: detected capacity change from 0 to 264192 [ 2894.813741][T13107] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 23:17:50 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010500)="ff030000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011700)="ed8100000a000000ddf4655fddf4655fddf4655f00000000000001", 0x1b, 0x2200}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531", 0x49, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a090000000000060000000000000005", 0x1d, 0x10000}, {&(0x7f0000000140)="e4b100000000800000a6009a7245c42c20", 0x11, 0x11400}], 0x0, &(0x7f0000013b00)) unlink(0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(r0, &(0x7f0000000080)='./file1\x00', 0x0, r2, 0x0) 23:17:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x13, &(0x7f00000001c0), 0x8) 23:17:50 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)}}], 0x1, 0xffd8) [ 2894.826380][ T24] audit: type=1400 audit(1652311070.670:650): avc: denied { mount } for pid=13101 comm="syz-executor.3" name="/" dev="loop3" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 2894.848391][ T24] audit: type=1400 audit(1652311070.670:651): avc: denied { setattr } for pid=13101 comm="syz-executor.3" name="file1" dev="loop3" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 2894.871239][ T24] audit: type=1400 audit(1652311070.700:652): avc: denied { create } for pid=13108 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2894.891284][ T24] audit: type=1400 audit(1652311070.700:653): avc: denied { connect } for pid=13108 comm="syz-executor.0" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2894.912155][ T24] audit: type=1400 audit(1652311070.700:654): avc: denied { write } for pid=13108 comm="syz-executor.0" laddr=::1 lport=255 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 23:17:50 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000001c0)=@assoc_value, &(0x7f0000000200)=0x8) 23:17:50 executing program 1: keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000000), &(0x7f0000000040)={'enc=', 'oaep', ' hash=', {'sha256-arm64\x00'}}, 0x0, 0x0) 23:17:50 executing program 4: socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x28, {0x2, 0x0, @broadcast}, 'vlan1\x00'}) 23:17:50 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x891e, &(0x7f0000000140)={'sit0\x00', 0x0}) 23:17:50 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{0x0}], 0x1}}], 0x1, 0xffd8) 23:17:50 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f4, &(0x7f0000000140)={'sit0\x00', 0x0}) 23:17:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x19, &(0x7f00000001c0), 0x8) 23:17:51 executing program 4: socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x28, {0x2, 0x0, @broadcast}, 'vlan1\x00'}) 23:17:51 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010500)="ff030000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011700)="ed8100000a000000ddf4655fddf4655fddf4655f00000000000001", 0x1b, 0x2200}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531", 0x49, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a090000000000060000000000000005", 0x1d, 0x10000}, {&(0x7f0000000140)="e4b100000000800000a6009a7245c42c20", 0x11, 0x11400}], 0x0, &(0x7f0000013b00)) unlink(0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(r0, &(0x7f0000000080)='./file1\x00', 0x0, r2, 0x0) 23:17:51 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @remote}, {0x6, @random="c79f3863a58d"}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) 23:17:51 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{0x0}], 0x1}}], 0x1, 0xffd8) [ 2895.141583][T13130] loop3: detected capacity change from 0 to 264192 [ 2895.169413][T13130] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 23:17:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x10}]}}, &(0x7f0000000140)=""/187, 0x26, 0xbb, 0x1}, 0x20) 23:17:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x46, 0x0, 0x0) 23:17:51 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8955, 0x0) 23:17:51 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}) 23:17:51 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{0x0}], 0x1}}], 0x1, 0xffd8) 23:17:51 executing program 2: sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c0f, 0x10, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0xfeb1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0xffc3, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000000c0)="80810000007f", 0xfc3b, 0x1600}], 0x81, &(0x7f0000000180)={[{@errors_remount}]}) 23:17:51 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @mcast1}}) 23:17:51 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8955, 0x0) 23:17:51 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010500)="ff030000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011700)="ed8100000a000000ddf4655fddf4655fddf4655f00000000000001", 0x1b, 0x2200}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531", 0x49, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a090000000000060000000000000005", 0x1d, 0x10000}, {&(0x7f0000000140)="e4b100000000800000a6009a7245c42c20", 0x11, 0x11400}], 0x0, &(0x7f0000013b00)) unlink(0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(r0, &(0x7f0000000080)='./file1\x00', 0x0, r2, 0x0) 23:17:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x1600bd7f, 0x0, 0x0) 23:17:51 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)}], 0x1}}], 0x1, 0xffd8) [ 2895.382102][T13155] loop3: detected capacity change from 0 to 264192 [ 2895.410038][T13155] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 23:17:51 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x1, &(0x7f0000000000)=@raw=[@call], &(0x7f0000000040)='GPL\x00', 0x3, 0xaa, &(0x7f0000000080)=""/170, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2895.458046][T13163] loop2: detected capacity change from 0 to 1054 [ 2895.474777][T13163] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 2895.485441][T13163] EXT4-fs (loop2): orphan cleanup on readonly fs [ 2895.491831][T13163] EXT4-fs error (device loop2): ext4_quota_enable:6850: inode #3: comm syz-executor.2: iget: bad extra_isize 576 (inode size 256) 23:17:51 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8955, 0x0) 23:17:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="ec0000001000010800"/20, @ANYRES32=r3, @ANYBLOB="0022050000000000cc001a8018000a80140007"], 0xec}}, 0x0) [ 2895.505813][T13163] EXT4-fs (loop2): Remounting filesystem read-only [ 2895.512341][T13163] EXT4-fs error (device loop2): ext4_quota_enable:6852: comm syz-executor.2: Bad quota inode # 3 [ 2895.523254][T13163] EXT4-fs warning (device loop2): ext4_enable_quotas:6892: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 2895.537343][T13163] EXT4-fs (loop2): Cannot turn on quotas: error -117 [ 2895.544035][T13163] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. 23:17:51 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 23:17:51 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)}], 0x1}}], 0x1, 0xffd8) 23:17:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in={{0x2, 0x0, @remote}}, 0x0, 0x0, 0x0, 0x0, "34e04c579b2d057d891969256b14fd9f20460e461a6309e1fc19bde2f112337224c4118ae2ea6188b8f174aff3f8dda681caf5f4efd69e56022bf491f34a3ae8c1117147b4568bbf34809e143b417ad1"}, 0xd8) 23:17:51 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @broadcast}, 'vlan1\x00'}) 23:17:51 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010500)="ff030000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011700)="ed8100000a000000ddf4655fddf4655fddf4655f00000000000001", 0x1b, 0x2200}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531", 0x49, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a090000000000060000000000000005", 0x1d, 0x10000}, {&(0x7f0000000140)="e4b100000000800000a6009a7245c42c20", 0x11, 0x11400}], 0x0, &(0x7f0000013b00)) unlink(0x0) socket(0x10, 0x2, 0x0) fchownat(r0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0) 23:17:51 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 23:17:51 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)}], 0x1}}], 0x1, 0xffd8) 23:17:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="ec0000001000010800"/20, @ANYRES32=r3, @ANYBLOB="0022050000000000cc001a8018000a80140007"], 0xec}}, 0x0) [ 2895.656731][T13177] loop3: detected capacity change from 0 to 264192 [ 2895.682804][T13177] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 23:17:51 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "1002c4c53729829ec96aae9d1166131dd9c8c91bc1baabd79820a4c35ccc7a76351a72febdd967ac85693eb9d84e7dbe6bf2fd5749c03d327b01a98080038441"}, 0x48, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='keyring\x00', &(0x7f0000000140)='fscrypt:') 23:17:51 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @broadcast}, 'vlan1\x00'}) 23:17:51 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x1000, 0xbe, &(0x7f00000000c0)=""/190, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:17:51 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="5a6a57ddde345bf06f42cb7185a88d2a035bdbff", 0x14}], 0x1}}], 0x1, 0xffd8) 23:17:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="ec0000001000010800"/20, @ANYRES32=r3, @ANYBLOB="0022050000000000cc001a8018000a80140007"], 0xec}}, 0x0) 23:17:51 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_opts(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)) 23:17:51 executing program 3: r0 = sy