33126][T23830] device bridge_slave_1 left promiscuous mode [ 3010.239297][T23830] bridge0: port 2(bridge_slave_1) entered disabled state [ 3010.282946][T23830] device bridge_slave_0 left promiscuous mode [ 3010.289082][T23830] bridge0: port 1(bridge_slave_0) entered disabled state [ 3011.014004][T23830] device hsr_slave_0 left promiscuous mode [ 3011.052469][T23830] device hsr_slave_1 left promiscuous mode [ 3011.118471][T23830] team0 (unregistering): Port device team_slave_1 removed [ 3011.128052][T23830] team0 (unregistering): Port device team_slave_0 removed [ 3011.137815][T23830] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3011.176699][T23830] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3011.252697][T23830] bond0 (unregistering): Released all slaves [ 3011.358731][T24870] IPVS: ftp: loaded support on port[0] = 21 [ 3011.407467][T24870] chnl_net:caif_netlink_parms(): no params data found [ 3011.435477][T24870] bridge0: port 1(bridge_slave_0) entered blocking state [ 3011.442654][T24870] bridge0: port 1(bridge_slave_0) entered disabled state [ 3011.450185][T24870] device bridge_slave_0 entered promiscuous mode [ 3011.457813][T24870] bridge0: port 2(bridge_slave_1) entered blocking state [ 3011.464930][T24870] bridge0: port 2(bridge_slave_1) entered disabled state [ 3011.472588][T24870] device bridge_slave_1 entered promiscuous mode [ 3011.489084][T24870] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3011.499617][T24870] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3011.515894][T24870] team0: Port device team_slave_0 added [ 3011.522458][T24870] team0: Port device team_slave_1 added [ 3011.574667][T24870] device hsr_slave_0 entered promiscuous mode [ 3011.612688][T24870] device hsr_slave_1 entered promiscuous mode [ 3011.652466][T24870] debugfs: Directory 'hsr0' with parent '/' already present! [ 3011.699987][T24870] bridge0: port 2(bridge_slave_1) entered blocking state [ 3011.707104][T24870] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3011.714515][T24870] bridge0: port 1(bridge_slave_0) entered blocking state [ 3011.721572][T24870] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3011.763866][T24870] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3011.776120][T14072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3011.785276][T14072] bridge0: port 1(bridge_slave_0) entered disabled state [ 3011.793107][T14072] bridge0: port 2(bridge_slave_1) entered disabled state [ 3011.806254][T24870] 8021q: adding VLAN 0 to HW filter on device team0 [ 3011.816931][T14072] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3011.825780][T14072] bridge0: port 1(bridge_slave_0) entered blocking state [ 3011.832862][T14072] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3011.854465][T17947] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3011.863186][T17947] bridge0: port 2(bridge_slave_1) entered blocking state [ 3011.870236][T17947] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3011.881058][T17947] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3011.890116][T17947] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3011.907174][T24870] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3011.917909][T24870] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3011.930440][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3011.938611][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3011.949817][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3011.958606][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3011.981280][T24870] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3012.148630][T24878] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3012.159391][T24878] CPU: 0 PID: 24878 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3012.167412][T24878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3012.177459][T24878] Call Trace: [ 3012.180774][T24878] dump_stack+0x1d8/0x2f8 [ 3012.185101][T24878] dump_header+0xd8/0x960 [ 3012.189407][T24878] oom_kill_process+0xcd/0x350 [ 3012.194166][T24878] out_of_memory+0x5c8/0x880 [ 3012.198767][T24878] memory_max_write+0x4ba/0x600 [ 3012.203600][T24878] ? memory_max_show+0xa0/0xa0 [ 3012.208334][T24878] cgroup_file_write+0x223/0x5f0 [ 3012.213265][T24878] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3012.218375][T24878] kernfs_fop_write+0x3e4/0x4f0 [ 3012.223221][T24878] ? kernfs_fop_read+0x580/0x580 [ 3012.228135][T24878] __vfs_write+0xb8/0x740 [ 3012.232464][T24878] ? check_preemption_disabled+0x47/0x2a0 [ 3012.238158][T24878] ? __sb_start_write+0x403/0x4c0 [ 3012.243174][T24878] vfs_write+0x275/0x590 [ 3012.247389][T24878] ksys_write+0x117/0x220 [ 3012.251736][T24878] __x64_sys_write+0x7b/0x90 [ 3012.256349][T24878] do_syscall_64+0xfe/0x140 [ 3012.260842][T24878] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3012.266712][T24878] RIP: 0033:0x459829 [ 3012.270582][T24878] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3012.290170][T24878] RSP: 002b:00007fb8c482ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3012.298558][T24878] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 3012.306507][T24878] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 3012.314464][T24878] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3012.322421][T24878] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb8c482f6d4 [ 3012.330366][T24878] R13: 00000000004c98fc R14: 00000000004e0ea8 R15: 00000000ffffffff [ 3012.343830][T24878] memory: usage 5496kB, limit 0kB, failcnt 3119801 [ 3012.357742][T24878] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3012.365302][T24878] Memory cgroup stats for /syz2: [ 3012.366034][T24878] anon 4313088 [ 3012.366034][T24878] file 143360 [ 3012.366034][T24878] kernel_stack 65536 [ 3012.366034][T24878] slab 987136 [ 3012.366034][T24878] sock 0 [ 3012.366034][T24878] shmem 0 [ 3012.366034][T24878] file_mapped 0 [ 3012.366034][T24878] file_dirty 0 [ 3012.366034][T24878] file_writeback 0 [ 3012.366034][T24878] anon_thp 4194304 [ 3012.366034][T24878] inactive_anon 0 [ 3012.366034][T24878] active_anon 4313088 [ 3012.366034][T24878] inactive_file 0 [ 3012.366034][T24878] active_file 0 [ 3012.366034][T24878] unevictable 0 [ 3012.366034][T24878] slab_reclaimable 270336 [ 3012.366034][T24878] slab_unreclaimable 716800 [ 3012.366034][T24878] pgfault 208494 [ 3012.366034][T24878] pgmajfault 0 [ 3012.366034][T24878] workingset_refault 0 [ 3012.366034][T24878] workingset_activate 0 [ 3012.366034][T24878] workingset_nodereclaim 0 [ 3012.366034][T24878] pgrefill 0 [ 3012.366034][T24878] pgscan 2083 [ 3012.366034][T24878] pgsteal 2083 [ 3012.366034][T24878] pgactivate 0 [ 3012.464078][T24878] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=24877,uid=0 [ 3012.480449][T24878] Memory cgroup out of memory: Killed process 24877 (syz-executor.2) total-vm:72712kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB 22:54:59 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x0, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:54:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) 22:54:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r1) tkill(r1, 0x9) 22:54:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:54:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x5, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:54:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x400000) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) [ 3012.498734][ T1058] oom_reaper: reaped process 24877 (syz-executor.2), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB [ 3012.536781][T24870] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 3012.568544][T24870] CPU: 1 PID: 24870 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3012.576559][T24870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3012.586610][T24870] Call Trace: [ 3012.589901][T24870] dump_stack+0x1d8/0x2f8 [ 3012.594233][T24870] dump_header+0xd8/0x960 [ 3012.598578][T24870] oom_kill_process+0xcd/0x350 [ 3012.598590][T24870] out_of_memory+0x5c8/0x880 [ 3012.598603][T24870] try_charge+0x125a/0x1910 [ 3012.598626][T24870] mem_cgroup_try_charge+0x20c/0x680 [ 3012.607969][T24870] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3012.607982][T24870] handle_mm_fault+0x312f/0x6010 [ 3012.608008][T24870] do_user_addr_fault+0x589/0xaf0 [ 3012.633341][T24870] __do_page_fault+0xd3/0x1f0 [ 3012.638027][T24870] do_page_fault+0x99/0xb0 [ 3012.642469][T24870] page_fault+0x39/0x40 [ 3012.646626][T24870] RIP: 0033:0x42fd7c 22:55:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r1) tkill(r1, 0x9) [ 3012.650513][T24870] Code: 83 c0 17 41 55 41 54 55 53 48 89 c5 48 83 e5 f0 48 89 fb 48 81 ec 98 00 00 00 48 83 f8 20 b8 20 00 00 00 48 0f 42 e8 48 85 ff <48> 89 74 24 08 0f 84 3a 08 00 00 48 3b 2d ea 51 64 00 77 70 89 ef [ 3012.670113][T24870] RSP: 002b:00007ffde1160fb0 EFLAGS: 00010202 [ 3012.676165][T24870] RAX: 0000000000000020 RBX: 0000000000715640 RCX: 0000000000458b94 [ 3012.684119][T24870] RDX: 00007ffde11610a0 RSI: 0000000000008030 RDI: 0000000000715640 [ 3012.692075][T24870] RBP: 0000000000008040 R08: 0000000000000001 R09: 0000555556400940 [ 3012.700032][T24870] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffde1162280 [ 3012.707991][T24870] R13: 00007ffde1162270 R14: 0000000000000000 R15: 00007ffde1162280 22:55:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) [ 3012.733264][T24870] memory: usage 1116kB, limit 0kB, failcnt 3119810 [ 3012.740057][T24870] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3012.750953][T24870] Memory cgroup stats for /syz2: [ 3012.751048][T24870] anon 53248 [ 3012.751048][T24870] file 143360 [ 3012.751048][T24870] kernel_stack 0 [ 3012.751048][T24870] slab 987136 [ 3012.751048][T24870] sock 0 [ 3012.751048][T24870] shmem 0 [ 3012.751048][T24870] file_mapped 0 [ 3012.751048][T24870] file_dirty 0 [ 3012.751048][T24870] file_writeback 0 [ 3012.751048][T24870] anon_thp 0 [ 3012.751048][T24870] inactive_anon 0 [ 3012.751048][T24870] active_anon 53248 [ 3012.751048][T24870] inactive_file 0 [ 3012.751048][T24870] active_file 0 [ 3012.751048][T24870] unevictable 0 [ 3012.751048][T24870] slab_reclaimable 270336 [ 3012.751048][T24870] slab_unreclaimable 716800 [ 3012.751048][T24870] pgfault 208494 [ 3012.751048][T24870] pgmajfault 0 [ 3012.751048][T24870] workingset_refault 0 [ 3012.751048][T24870] workingset_activate 0 [ 3012.751048][T24870] workingset_nodereclaim 0 22:55:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) 22:55:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x7, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r1) tkill(r1, 0x9) [ 3012.751048][T24870] pgrefill 0 [ 3012.751048][T24870] pgscan 2083 [ 3012.751048][T24870] pgsteal 2083 [ 3012.751048][T24870] pgactivate 0 22:55:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) [ 3012.912431][T24870] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=24870,uid=0 [ 3012.958345][T24870] Memory cgroup out of memory: Killed process 24870 (syz-executor.2) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 3012.995473][ T1058] oom_reaper: reaped process 24870 (syz-executor.2), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 22:55:00 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x0, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x8, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) setsockopt$ax25_int(r1, 0x101, 0xb, &(0x7f0000000100), 0x4) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x2) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f0000000040)=0x1) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) 22:55:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000), 0x43578cf5) tkill(r0, 0x9) 22:55:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(&(0x7f0000000040)) write(0xffffffffffffffff, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r1) tkill(r1, 0x9) 22:55:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x9, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(&(0x7f0000000040)) write(0xffffffffffffffff, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r1) tkill(r1, 0x9) 22:55:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x840000000002, 0x3, 0xff) r2 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x9, 0x8000) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000280)={r0, r2}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00 \x00', 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x4, @empty, 0x6}}, 0xe0, 0x30f00000000000, 0x7c, 0x1ff, 0x7ff}, &(0x7f0000000000)=0x98) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @empty}, 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000040)={r3, 0xffffffffffffff7b, 0x800, 0x3}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="5ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b000000000000000000000000000020acdb092c04c82afe47faa1e56f20c9eb88"], 0x9e) 22:55:00 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x0, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000), 0x43578cf5) tkill(r0, 0x9) 22:55:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0xa, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000), 0x43578cf5) tkill(r0, 0x9) 22:55:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c050000000000000001641005116601000000178ff59941ecd1ca0900000b00"/56], 0x9e) 22:55:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(&(0x7f0000000040)) write(0xffffffffffffffff, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r1) tkill(r1, 0x9) 22:55:01 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000), 0x43578cf5) tkill(r0, 0x9) 22:55:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0xb, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x9, 0x2000) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000040)={0x0, 0x1, {0x1e, 0x3, 0xe, 0x1e, 0x5, 0x90, 0x6, 0xaf, 0xffffffffffffffff}}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x4e22, @initdev}, 0x95c39bc2520c87b) setsockopt$inet_udp_int(r1, 0x11, 0x65, &(0x7f0000000100)=0x7, 0x4) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) 22:55:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) [ 3014.632885][T23830] device bridge_slave_1 left promiscuous mode [ 3014.639104][T23830] bridge0: port 2(bridge_slave_1) entered disabled state [ 3014.683306][T23830] device bridge_slave_0 left promiscuous mode [ 3014.689512][T23830] bridge0: port 1(bridge_slave_0) entered disabled state [ 3015.402697][T23830] device hsr_slave_0 left promiscuous mode [ 3015.462433][T23830] device hsr_slave_1 left promiscuous mode [ 3015.526527][T23830] team0 (unregistering): Port device team_slave_1 removed [ 3015.537286][T23830] team0 (unregistering): Port device team_slave_0 removed [ 3015.547120][T23830] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3015.576164][T23830] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3015.641381][T23830] bond0 (unregistering): Released all slaves [ 3015.758390][T25496] IPVS: ftp: loaded support on port[0] = 21 [ 3015.811250][T25496] chnl_net:caif_netlink_parms(): no params data found [ 3015.835744][T25496] bridge0: port 1(bridge_slave_0) entered blocking state [ 3015.842909][T25496] bridge0: port 1(bridge_slave_0) entered disabled state [ 3015.850409][T25496] device bridge_slave_0 entered promiscuous mode [ 3015.857941][T25496] bridge0: port 2(bridge_slave_1) entered blocking state [ 3015.865093][T25496] bridge0: port 2(bridge_slave_1) entered disabled state [ 3015.872981][T25496] device bridge_slave_1 entered promiscuous mode [ 3015.886237][T25496] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3015.897332][T25496] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3015.912142][T25496] team0: Port device team_slave_0 added [ 3015.918995][T25496] team0: Port device team_slave_1 added [ 3015.983713][T25496] device hsr_slave_0 entered promiscuous mode [ 3016.022581][T25496] device hsr_slave_1 entered promiscuous mode [ 3016.092400][T25496] debugfs: Directory 'hsr0' with parent '/' already present! [ 3016.149863][T25496] bridge0: port 2(bridge_slave_1) entered blocking state [ 3016.157014][T25496] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3016.164378][T25496] bridge0: port 1(bridge_slave_0) entered blocking state [ 3016.171450][T25496] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3016.216274][T25496] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3016.228903][T17947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3016.240344][T17947] bridge0: port 1(bridge_slave_0) entered disabled state [ 3016.249037][T17947] bridge0: port 2(bridge_slave_1) entered disabled state [ 3016.263695][T25496] 8021q: adding VLAN 0 to HW filter on device team0 [ 3016.274225][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3016.282864][T10733] bridge0: port 1(bridge_slave_0) entered blocking state [ 3016.289927][T10733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3016.317866][T14882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3016.326770][T14882] bridge0: port 2(bridge_slave_1) entered blocking state [ 3016.333855][T14882] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3016.346561][T14882] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3016.356062][T14882] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3016.374172][T25496] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3016.388616][T25496] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3016.401376][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3016.411860][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3016.421171][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3016.441991][T25496] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3016.453755][T17947] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3016.637994][T25504] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3016.651649][T25504] CPU: 1 PID: 25504 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3016.659637][T25504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3016.669698][T25504] Call Trace: [ 3016.672995][T25504] dump_stack+0x1d8/0x2f8 [ 3016.677340][T25504] dump_header+0xd8/0x960 [ 3016.681660][T25504] oom_kill_process+0xcd/0x350 [ 3016.686399][T25504] out_of_memory+0x5c8/0x880 [ 3016.690968][T25504] memory_max_write+0x4ba/0x600 [ 3016.695836][T25504] ? memory_max_show+0xa0/0xa0 [ 3016.700591][T25504] cgroup_file_write+0x223/0x5f0 [ 3016.705503][T25504] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3016.710603][T25504] kernfs_fop_write+0x3e4/0x4f0 [ 3016.715443][T25504] ? kernfs_fop_read+0x580/0x580 [ 3016.720376][T25504] __vfs_write+0xb8/0x740 [ 3016.724682][T25504] ? check_preemption_disabled+0x47/0x2a0 [ 3016.730411][T25504] ? __sb_start_write+0x403/0x4c0 [ 3016.735427][T25504] vfs_write+0x275/0x590 [ 3016.739654][T25504] ksys_write+0x117/0x220 [ 3016.743960][T25504] __x64_sys_write+0x7b/0x90 [ 3016.748525][T25504] do_syscall_64+0xfe/0x140 [ 3016.753005][T25504] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3016.758869][T25504] RIP: 0033:0x459829 [ 3016.762755][T25504] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3016.782347][T25504] RSP: 002b:00007fc5cdd10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3016.790735][T25504] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 3016.798709][T25504] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 3016.806657][T25504] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3016.814617][T25504] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc5cdd116d4 [ 3016.822573][T25504] R13: 00000000004c98fc R14: 00000000004e0ea8 R15: 00000000ffffffff [ 3016.835228][T25504] memory: usage 5488kB, limit 0kB, failcnt 3119817 [ 3016.842007][T25504] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3016.849389][T25504] Memory cgroup stats for /syz2: [ 3016.849577][T25504] anon 4288512 [ 3016.849577][T25504] file 143360 [ 3016.849577][T25504] kernel_stack 65536 [ 3016.849577][T25504] slab 987136 [ 3016.849577][T25504] sock 0 [ 3016.849577][T25504] shmem 0 [ 3016.849577][T25504] file_mapped 0 [ 3016.849577][T25504] file_dirty 0 [ 3016.849577][T25504] file_writeback 0 [ 3016.849577][T25504] anon_thp 4194304 [ 3016.849577][T25504] inactive_anon 0 [ 3016.849577][T25504] active_anon 4288512 [ 3016.849577][T25504] inactive_file 0 [ 3016.849577][T25504] active_file 0 [ 3016.849577][T25504] unevictable 0 [ 3016.849577][T25504] slab_reclaimable 270336 [ 3016.849577][T25504] slab_unreclaimable 716800 [ 3016.849577][T25504] pgfault 208560 [ 3016.849577][T25504] pgmajfault 0 [ 3016.849577][T25504] workingset_refault 0 [ 3016.849577][T25504] workingset_activate 0 [ 3016.849577][T25504] workingset_nodereclaim 0 [ 3016.849577][T25504] pgrefill 0 [ 3016.849577][T25504] pgscan 2083 [ 3016.849577][T25504] pgsteal 2083 [ 3016.849577][T25504] pgactivate 0 [ 3016.946022][T25504] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=25503,uid=0 [ 3016.962930][T25504] Memory cgroup out of memory: Killed process 25503 (syz-executor.2) total-vm:72712kB, anon-rss:4192kB, file-rss:34816kB, shmem-rss:0kB [ 3016.978975][ T1058] oom_reaper: reaped process 25503 (syz-executor.2), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB [ 3017.053455][T25496] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 3017.091592][T25496] CPU: 1 PID: 25496 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3017.099624][T25496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3017.109688][T25496] Call Trace: [ 3017.112975][T25496] dump_stack+0x1d8/0x2f8 [ 3017.117313][T25496] dump_header+0xd8/0x960 [ 3017.121638][T25496] oom_kill_process+0xcd/0x350 [ 3017.126406][T25496] out_of_memory+0x5c8/0x880 [ 3017.130998][T25496] try_charge+0x125a/0x1910 [ 3017.135517][T25496] mem_cgroup_try_charge+0x20c/0x680 [ 3017.140810][T25496] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3017.146445][T25496] wp_page_copy+0x35c/0x1980 [ 3017.151044][T25496] ? trace_lock_release+0x135/0x1a0 [ 3017.156240][T25496] ? do_wp_page+0x27f/0x1cc0 [ 3017.160833][T25496] ? __kasan_check_read+0x11/0x20 [ 3017.165855][T25496] ? do_raw_spin_unlock+0x49/0x260 [ 3017.170960][T25496] do_wp_page+0x5e5/0x1cc0 [ 3017.175368][T25496] ? __kasan_check_write+0x14/0x20 [ 3017.175383][T25496] handle_mm_fault+0x2adf/0x6010 [ 3017.175411][T25496] do_user_addr_fault+0x589/0xaf0 [ 3017.190464][T25496] __do_page_fault+0xd3/0x1f0 [ 3017.195143][T25496] do_page_fault+0x99/0xb0 [ 3017.199565][T25496] page_fault+0x39/0x40 22:55:04 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x0, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:04 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000), 0x43578cf5) tkill(r0, 0x9) 22:55:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, 0x0, 0x0) ptrace(0x4206, r1) tkill(r1, 0x9) 22:55:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0xc, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000540)='/dev/radio#\x00', 0x0, 0x2) close(r0) r2 = socket(0x840000000002, 0x3, 0xff) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$KVM_GET_CPUID2(r4, 0xc008ae91, &(0x7f00000003c0)=ANY=[@ANYBLOB="070000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002d1b61b70000000000000000000000000000000000000000000080400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000004b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0cb8aaac67713b0000000000000000ec0000"]) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000000)=0x1001000) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000580)={0x2000, 0x11000}) r5 = fcntl$dupfd(r0, 0x406, r0) write$RDMA_USER_CM_CMD_GET_EVENT(r5, &(0x7f0000000100)={0xc, 0x8, 0xfa00, {&(0x7f0000000240)}}, 0x10) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r5, 0x84, 0xc, &(0x7f00000001c0), &(0x7f0000000500)=0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) socket$inet6(0xa, 0x800, 0x7) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7eca4238011575750032006c05000000000000000107cf352c9bc9525a0038000000000000000900000b00"/56], 0x9e) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000600), 0x4) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000040), 0x4) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f00000005c0)=0x69) 22:55:04 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000), 0x43578cf5) tkill(r0, 0x9) 22:55:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x100000000000, 0x42) r1 = socket(0x840000000002, 0x3, 0xff) getsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400000, 0x0) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000040)={0x2, 0x0, [{}, {}]}) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) sendmsg$inet(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000240)="390bc9ba8c3ecd5115dde67ea23bb5a65f87e3ad65fdcace39bb003898f83d7ffde039a27dc2b09e9c1c4250c8d255f0e837db80e7dbb0a0c3f38ffb46e0955c65bd370a8cf83021f2e9b3721be002458f4e49878a02e773db783edb955ddb00c63783ac4334ff6448b411d344", 0x6d}, {&(0x7f00000002c0)="aa2eb043620d1a47bf6e3984cf8f324ce5f13784590752408ad78b01be2775f745d7a4bcef7924ea36148441143d308ea70743947b0b12bfb1e50b8646cea019876fb0e508317d0a24639676a555645e863202639cdc3f95ceb7a6e8b12f6f31f0d2747a19873a55d43270d658a06aa09f5e806dc95ed50356ab221d5768b11aac7906f323308a4d235764b55331c4b40fa9faf83d8f41a0e22013fa41c72aa31adf9b407c861a4c4d96eb03c8e5bb33e73c4c29f3d81c005fcd", 0xba}], 0x2, &(0x7f00000003c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}], 0x18}, 0x20000080) [ 3017.203715][T25496] RIP: 0033:0x4034f2 [ 3017.203725][T25496] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 59 8d 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 79 42 05 00 48 [ 3017.203730][T25496] RSP: 002b:00007fff3970ac90 EFLAGS: 00010246 [ 3017.203738][T25496] RAX: 0000000000000000 RBX: 00000000002e07a9 RCX: 0000000000413430 [ 3017.203743][T25496] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007fff3970bdc0 22:55:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0xd, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, 0x0, 0x0) ptrace(0x4206, r1) tkill(r1, 0x9) 22:55:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) [ 3017.203748][T25496] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000555555811940 [ 3017.203759][T25496] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff3970bdc0 [ 3017.227255][T25496] R13: 00007fff3970bdb0 R14: 0000000000000000 R15: 00007fff3970bdc0 [ 3017.254992][T25496] memory: usage 1108kB, limit 0kB, failcnt 3119828 22:55:04 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) [ 3017.372705][T25496] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3017.430943][T25496] Memory cgroup stats for /syz2: [ 3017.431024][T25496] anon 57344 [ 3017.431024][T25496] file 143360 [ 3017.431024][T25496] kernel_stack 65536 [ 3017.431024][T25496] slab 987136 [ 3017.431024][T25496] sock 0 [ 3017.431024][T25496] shmem 0 [ 3017.431024][T25496] file_mapped 0 [ 3017.431024][T25496] file_dirty 0 [ 3017.431024][T25496] file_writeback 0 [ 3017.431024][T25496] anon_thp 0 [ 3017.431024][T25496] inactive_anon 0 [ 3017.431024][T25496] active_anon 57344 [ 3017.431024][T25496] inactive_file 0 [ 3017.431024][T25496] active_file 0 [ 3017.431024][T25496] unevictable 0 [ 3017.431024][T25496] slab_reclaimable 270336 [ 3017.431024][T25496] slab_unreclaimable 716800 [ 3017.431024][T25496] pgfault 208560 [ 3017.431024][T25496] pgmajfault 0 [ 3017.431024][T25496] workingset_refault 0 [ 3017.431024][T25496] workingset_activate 0 [ 3017.431024][T25496] workingset_nodereclaim 0 [ 3017.431024][T25496] pgrefill 0 [ 3017.431024][T25496] pgscan 2083 [ 3017.431024][T25496] pgsteal 2083 [ 3017.431024][T25496] pgactivate 0 [ 3017.449129][T25496] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=25496,uid=0 [ 3017.550990][T25496] Memory cgroup out of memory: Killed process 25496 (syz-executor.2) total-vm:72448kB, anon-rss:76kB, file-rss:34832kB, shmem-rss:0kB [ 3017.566582][ T1058] oom_reaper: reaped process 25496 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 22:55:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, 0x0, 0x0) ptrace(0x4206, r1) tkill(r1, 0x9) 22:55:05 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x0, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0xe, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x212001, 0x0) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f0000000400)=""/168) execveat(r2, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)=[&(0x7f00000001c0)='(\x00'], &(0x7f0000000380)=[&(0x7f0000000340)='D/\x00'], 0x1000) r3 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f00000003c0)=0x100000000, 0x4) ioctl$VIDIOC_G_EXT_CTRLS(r3, 0xc0205647, &(0x7f0000000100)={0x9a0000, 0x2c, 0x0, [], &(0x7f00000000c0)={0xb90967, 0x7, [], @string=&(0x7f0000000040)=0x4}}) r4 = fcntl$dupfd(r0, 0x406, r1) ioctl$ASHMEM_GET_PIN_STATUS(r4, 0x7709, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b0000000000000000000000000000f345adacdfc613668c1ccd5ed6b7a662c6412d6f025262bcc03bab3415e914db37fd364fa2a01c494b0e0eec083bfdf148c6e3fc468f298ab80f7501a8bb70f83b6d0f1f8674a6a18b030955e07c2148f3a9f546be46ceb88878"], 0x9e) 22:55:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:05 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) 22:55:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) ptrace(0xffffffffffffffff, r1) tkill(r1, 0x9) 22:55:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0xf, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:05 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) 22:55:05 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x0, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0xa40000000000, 0x3, 0xbb) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0xa) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYRES16=r0], 0x2) 22:55:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x10, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000), 0x43578cf5) tkill(r0, 0x9) 22:55:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x4, 0x2000) ioctl$IMGETVERSION(r1, 0x80044942, &(0x7f0000000040)) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) 22:55:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x11, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) ptrace(0xffffffffffffffff, r1) tkill(r1, 0x9) 22:55:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000), 0x43578cf5) tkill(r0, 0x9) 22:55:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) [ 3019.183142][T10708] device bridge_slave_1 left promiscuous mode [ 3019.189325][T10708] bridge0: port 2(bridge_slave_1) entered disabled state [ 3019.243733][T10708] device bridge_slave_0 left promiscuous mode [ 3019.249889][T10708] bridge0: port 1(bridge_slave_0) entered disabled state [ 3019.952930][T10708] device hsr_slave_0 left promiscuous mode [ 3019.992547][T10708] device hsr_slave_1 left promiscuous mode [ 3020.037601][T10708] team0 (unregistering): Port device team_slave_1 removed [ 3020.047183][T10708] team0 (unregistering): Port device team_slave_0 removed [ 3020.058452][T10708] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3020.097265][T10708] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3020.172885][T10708] bond0 (unregistering): Released all slaves [ 3020.257988][T26125] IPVS: ftp: loaded support on port[0] = 21 [ 3020.309430][T26125] chnl_net:caif_netlink_parms(): no params data found [ 3020.337031][T26125] bridge0: port 1(bridge_slave_0) entered blocking state [ 3020.344238][T26125] bridge0: port 1(bridge_slave_0) entered disabled state [ 3020.351760][T26125] device bridge_slave_0 entered promiscuous mode [ 3020.359217][T26125] bridge0: port 2(bridge_slave_1) entered blocking state [ 3020.366374][T26125] bridge0: port 2(bridge_slave_1) entered disabled state [ 3020.374266][T26125] device bridge_slave_1 entered promiscuous mode [ 3020.390625][T26125] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3020.446306][T26125] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3020.465706][T26125] team0: Port device team_slave_0 added [ 3020.472740][T26125] team0: Port device team_slave_1 added [ 3020.527360][T26125] device hsr_slave_0 entered promiscuous mode [ 3020.585587][T26125] device hsr_slave_1 entered promiscuous mode [ 3020.642510][T26125] debugfs: Directory 'hsr0' with parent '/' already present! [ 3020.658508][T26125] bridge0: port 2(bridge_slave_1) entered blocking state [ 3020.665622][T26125] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3020.672980][T26125] bridge0: port 1(bridge_slave_0) entered blocking state [ 3020.680066][T26125] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3020.716920][T26125] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3020.729916][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3020.738969][T10733] bridge0: port 1(bridge_slave_0) entered disabled state [ 3020.746686][T10733] bridge0: port 2(bridge_slave_1) entered disabled state [ 3020.758543][T26125] 8021q: adding VLAN 0 to HW filter on device team0 [ 3020.769595][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3020.778352][T10733] bridge0: port 1(bridge_slave_0) entered blocking state [ 3020.785440][T10733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3020.803693][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3020.812055][ T9644] bridge0: port 2(bridge_slave_1) entered blocking state [ 3020.819174][ T9644] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3020.827271][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3020.835817][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3020.846058][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3020.855064][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3020.866825][T26125] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3020.878078][T26125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3020.886840][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3020.901916][T26125] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3021.058127][T26133] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3021.068595][T26133] CPU: 1 PID: 26133 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3021.076562][T26133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3021.086598][T26133] Call Trace: [ 3021.089869][T26133] dump_stack+0x1d8/0x2f8 [ 3021.094188][T26133] dump_header+0xd8/0x960 [ 3021.098510][T26133] oom_kill_process+0xcd/0x350 [ 3021.103261][T26133] out_of_memory+0x5c8/0x880 [ 3021.107849][T26133] memory_max_write+0x4ba/0x600 [ 3021.112688][T26133] ? memory_max_show+0xa0/0xa0 [ 3021.117428][T26133] cgroup_file_write+0x223/0x5f0 [ 3021.122355][T26133] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3021.127455][T26133] kernfs_fop_write+0x3e4/0x4f0 [ 3021.132317][T26133] ? kernfs_fop_read+0x580/0x580 [ 3021.137246][T26133] __vfs_write+0xb8/0x740 [ 3021.141555][T26133] ? check_preemption_disabled+0x47/0x2a0 [ 3021.147251][T26133] ? __sb_start_write+0x403/0x4c0 [ 3021.152274][T26133] vfs_write+0x275/0x590 [ 3021.156528][T26133] ksys_write+0x117/0x220 [ 3021.160834][T26133] __x64_sys_write+0x7b/0x90 [ 3021.165401][T26133] do_syscall_64+0xfe/0x140 [ 3021.169880][T26133] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3021.175763][T26133] RIP: 0033:0x459829 [ 3021.179636][T26133] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3021.199251][T26133] RSP: 002b:00007f1b191b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3021.207688][T26133] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 3021.215667][T26133] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 3021.223629][T26133] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3021.231580][T26133] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1b191ba6d4 [ 3021.239526][T26133] R13: 00000000004c98fc R14: 00000000004e0ea8 R15: 00000000ffffffff [ 3021.250066][T26133] memory: usage 5468kB, limit 0kB, failcnt 3119837 [ 3021.256841][T26133] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3021.263856][T26133] Memory cgroup stats for /syz2: [ 3021.264248][T26133] anon 4317184 [ 3021.264248][T26133] file 143360 [ 3021.264248][T26133] kernel_stack 65536 [ 3021.264248][T26133] slab 987136 [ 3021.264248][T26133] sock 0 [ 3021.264248][T26133] shmem 0 [ 3021.264248][T26133] file_mapped 0 [ 3021.264248][T26133] file_dirty 0 [ 3021.264248][T26133] file_writeback 0 [ 3021.264248][T26133] anon_thp 4194304 [ 3021.264248][T26133] inactive_anon 0 [ 3021.264248][T26133] active_anon 4317184 [ 3021.264248][T26133] inactive_file 0 [ 3021.264248][T26133] active_file 0 [ 3021.264248][T26133] unevictable 0 [ 3021.264248][T26133] slab_reclaimable 270336 [ 3021.264248][T26133] slab_unreclaimable 716800 [ 3021.264248][T26133] pgfault 208593 [ 3021.264248][T26133] pgmajfault 0 [ 3021.264248][T26133] workingset_refault 0 [ 3021.264248][T26133] workingset_activate 0 [ 3021.264248][T26133] workingset_nodereclaim 0 [ 3021.264248][T26133] pgrefill 0 [ 3021.264248][T26133] pgscan 2083 [ 3021.264248][T26133] pgsteal 2083 [ 3021.264248][T26133] pgactivate 0 [ 3021.366552][T26133] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=26131,uid=0 [ 3021.383779][T26133] Memory cgroup out of memory: Killed process 26131 (syz-executor.2) total-vm:72712kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB 22:55:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000), 0x43578cf5) tkill(r0, 0x9) 22:55:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setpipe(r0, 0x407, 0xcb) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket(0x840000000002, 0x3, 0xff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r2, 0x400443c9, &(0x7f0000000140)={{0x0, 0x1, 0x1, 0x0, 0x4, 0x3f}, 0xb19c}) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x40, 0x0) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x3c7, 0x36}, &(0x7f0000000040)=0x8) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='timers\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r3, &(0x7f00000005c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x84, r6, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5590}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfffffffffffffff8}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x100000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffffffffffffff67}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}]}, @TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x84}}, 0x0) ioctl$KVM_GET_DIRTY_LOG(r5, 0x4010ae42, &(0x7f00000001c0)={0x101ff, 0x0, &(0x7f0000ffd000/0x1000)=nil}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000000c0)={r4, 0x8205bba}, &(0x7f0000000100)=0x8) bind$nfc_llcp(r1, &(0x7f0000000600)={0x27, 0x1, 0x0, 0x0, 0x0, 0x10000, "31abd10eefb7d80da63caed63160392feefef0bde419b8befccb77dabc9a3e79ef8e9ad83c353ddaefdb60a0e5919aa80cbc6584f1d8d889154808e9f02fde", 0x21}, 0x60) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x9e) 22:55:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x12, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) ptrace(0xffffffffffffffff, r1) tkill(r1, 0x9) 22:55:08 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) [ 3021.400329][ T1058] oom_reaper: reaped process 26131 (syz-executor.2), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB [ 3021.467704][T26125] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 3021.480773][T26125] CPU: 0 PID: 26125 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3021.488769][T26125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3021.498824][T26125] Call Trace: [ 3021.502144][T26125] dump_stack+0x1d8/0x2f8 [ 3021.506498][T26125] dump_header+0xd8/0x960 [ 3021.510835][T26125] oom_kill_process+0xcd/0x350 [ 3021.515591][T26125] out_of_memory+0x5c8/0x880 [ 3021.520184][T26125] try_charge+0x125a/0x1910 [ 3021.524702][T26125] mem_cgroup_try_charge+0x20c/0x680 [ 3021.530029][T26125] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3021.535671][T26125] wp_page_copy+0x35c/0x1980 [ 3021.540251][T26125] ? trace_lock_release+0x135/0x1a0 [ 3021.545426][T26125] ? do_wp_page+0x27f/0x1cc0 [ 3021.549994][T26125] ? __kasan_check_read+0x11/0x20 [ 3021.554995][T26125] ? do_raw_spin_unlock+0x49/0x260 [ 3021.560082][T26125] do_wp_page+0x5e5/0x1cc0 22:55:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000), 0x43578cf5) tkill(r0, 0x9) [ 3021.564484][T26125] ? __kasan_check_write+0x14/0x20 [ 3021.569604][T26125] handle_mm_fault+0x2adf/0x6010 [ 3021.574551][T26125] do_user_addr_fault+0x589/0xaf0 [ 3021.579579][T26125] __do_page_fault+0xd3/0x1f0 [ 3021.584247][T26125] do_page_fault+0x99/0xb0 [ 3021.584259][T26125] page_fault+0x39/0x40 [ 3021.584268][T26125] RIP: 0033:0x430906 [ 3021.584277][T26125] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 5c 46 64 00 85 c0 0f 84 [ 3021.584282][T26125] RSP: 002b:00007ffd802d8210 EFLAGS: 00010206 [ 3021.584289][T26125] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 3021.584295][T26125] RDX: 000055555686a930 RSI: 0000555556872970 RDI: 0000000000000003 [ 3021.584300][T26125] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555556869940 [ 3021.584306][T26125] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 3021.584316][T26125] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 22:55:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x13, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0xffffffffffffffff, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) r1 = syz_open_pts(0xffffffffffffffff, 0x141000) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}]}) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) 22:55:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) [ 3021.673080][T26125] memory: usage 1060kB, limit 0kB, failcnt 3119846 [ 3021.679603][T26125] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 22:55:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, 0x0) tkill(r1, 0x9) [ 3021.762046][T26125] Memory cgroup stats for /syz2: [ 3021.762134][T26125] anon 61440 [ 3021.762134][T26125] file 143360 [ 3021.762134][T26125] kernel_stack 0 [ 3021.762134][T26125] slab 987136 [ 3021.762134][T26125] sock 0 [ 3021.762134][T26125] shmem 0 [ 3021.762134][T26125] file_mapped 0 [ 3021.762134][T26125] file_dirty 0 [ 3021.762134][T26125] file_writeback 0 [ 3021.762134][T26125] anon_thp 0 [ 3021.762134][T26125] inactive_anon 0 [ 3021.762134][T26125] active_anon 61440 [ 3021.762134][T26125] inactive_file 0 [ 3021.762134][T26125] active_file 0 22:55:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x14, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000), 0x43578cf5) tkill(r0, 0x9) 22:55:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, 0x0) tkill(r1, 0x9) [ 3021.762134][T26125] unevictable 0 [ 3021.762134][T26125] slab_reclaimable 270336 [ 3021.762134][T26125] slab_unreclaimable 716800 [ 3021.762134][T26125] pgfault 208593 [ 3021.762134][T26125] pgmajfault 0 [ 3021.762134][T26125] workingset_refault 0 [ 3021.762134][T26125] workingset_activate 0 [ 3021.762134][T26125] workingset_nodereclaim 0 [ 3021.762134][T26125] pgrefill 0 [ 3021.762134][T26125] pgscan 2083 [ 3021.762134][T26125] pgsteal 2083 [ 3021.762134][T26125] pgactivate 0 22:55:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) [ 3021.967108][T26125] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=26125,uid=0 [ 3021.994121][T26125] Memory cgroup out of memory: Killed process 26125 (syz-executor.2) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 3022.029057][ T1058] oom_reaper: reaped process 26125 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 22:55:09 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000), 0x43578cf5) tkill(r0, 0x9) 22:55:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x15, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, 0x0) tkill(r1, 0x9) 22:55:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti\x00 \x00\x00\x00\x00\x00\x04\x00', 0x10) sendto$unix(r1, &(0x7f0000000100)="c0cc4618584445419fa4076fd0744f9312022521c8d90f6c96437837b8b3171bfa529251ac01af4fd3a29a843868f6f60c4feb76a21265c656990f25b0a1e98584f0d1f8e0b9c1c8271271088a0b0a2370f5f6ea59e31955fb3286b58cb8eddc42873f49ca2e5d5e1f10b853fa9dafe50f104652bbee269145213f4bb31260e688b98b3cb4260f03b8b6c5e00142f6551b8ff68ffd0887b6b2d16b6e4ea9cf6d5e06e04c5a1175f39b843984ce453301208c8ebc84da25", 0xb7, 0x48040, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b0000000000000000000000000000007af3003525b52a552bf1fc1be4b8b4e4dd28cfbfe54050ac4d43cc97a1efbb3f74807cf49122680c"], 0x9e) 22:55:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x16, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) 22:55:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r1) tkill(0x0, 0x9) 22:55:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) inotify_init1(0x80000) 22:55:09 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f452946000057be100511660100000038000000000000000900000b00"/56], 0x9e) 22:55:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) 22:55:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) 22:55:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:10 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000004480)='ns/user\x00') fgetxattr(r0, &(0x7f00000044c0)=@known='trusted.syz\x00', &(0x7f0000004500)=""/4096, 0x1000) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x80) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000340)={0x0}) ioctl$DRM_IOCTL_DMA(r2, 0xc0406429, &(0x7f00000002c0)={r3, 0xa, &(0x7f0000000180)=[0x6, 0x800, 0x10000, 0x2, 0x5, 0xfffffffffffffff7, 0x4, 0x4, 0x1e2, 0x7fff], &(0x7f00000001c0)=[0xe1d, 0x8], 0x10, 0x5, 0xbbd1, &(0x7f0000000240)=[0x0, 0xff, 0x5, 0x1104, 0x5], &(0x7f0000000280)=[0x2, 0xffffffff, 0x0]}) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) r4 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x6, 0x800) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r4, 0x80045300, &(0x7f0000000140)) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) 22:55:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r1) tkill(0x0, 0x9) 22:55:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) [ 3023.583118][T10708] device bridge_slave_1 left promiscuous mode [ 3023.589361][T10708] bridge0: port 2(bridge_slave_1) entered disabled state [ 3023.633176][T10708] device bridge_slave_0 left promiscuous mode [ 3023.639421][T10708] bridge0: port 1(bridge_slave_0) entered disabled state [ 3024.373187][T10708] device hsr_slave_0 left promiscuous mode [ 3024.432473][T10708] device hsr_slave_1 left promiscuous mode [ 3024.477909][T10708] team0 (unregistering): Port device team_slave_1 removed [ 3024.487519][T10708] team0 (unregistering): Port device team_slave_0 removed [ 3024.497791][T10708] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3024.564947][T10708] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3024.651624][T10708] bond0 (unregistering): Released all slaves [ 3024.768141][T26976] IPVS: ftp: loaded support on port[0] = 21 [ 3024.819021][T26976] chnl_net:caif_netlink_parms(): no params data found [ 3024.845811][T26976] bridge0: port 1(bridge_slave_0) entered blocking state [ 3024.853083][T26976] bridge0: port 1(bridge_slave_0) entered disabled state [ 3024.860580][T26976] device bridge_slave_0 entered promiscuous mode [ 3024.868150][T26976] bridge0: port 2(bridge_slave_1) entered blocking state [ 3024.875279][T26976] bridge0: port 2(bridge_slave_1) entered disabled state [ 3024.883078][T26976] device bridge_slave_1 entered promiscuous mode [ 3024.898258][T26976] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3024.908725][T26976] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3024.924116][T26976] team0: Port device team_slave_0 added [ 3024.930548][T26976] team0: Port device team_slave_1 added [ 3024.974918][T26976] device hsr_slave_0 entered promiscuous mode [ 3025.032757][T26976] device hsr_slave_1 entered promiscuous mode [ 3025.072446][T26976] debugfs: Directory 'hsr0' with parent '/' already present! [ 3025.142222][T26976] bridge0: port 2(bridge_slave_1) entered blocking state [ 3025.149367][T26976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3025.156730][T26976] bridge0: port 1(bridge_slave_0) entered blocking state [ 3025.163836][T26976] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3025.209209][T26976] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3025.225388][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3025.236142][ T9644] bridge0: port 1(bridge_slave_0) entered disabled state [ 3025.245733][ T9644] bridge0: port 2(bridge_slave_1) entered disabled state [ 3025.259615][T26976] 8021q: adding VLAN 0 to HW filter on device team0 [ 3025.271142][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3025.280193][ T9644] bridge0: port 1(bridge_slave_0) entered blocking state [ 3025.287296][ T9644] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3025.306007][T10691] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3025.314413][T10691] bridge0: port 2(bridge_slave_1) entered blocking state [ 3025.321502][T10691] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3025.340392][T26976] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3025.351380][T26976] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3025.367571][T14072] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3025.376765][T14072] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3025.388816][T14072] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3025.399081][T14072] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3025.420205][T26976] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3025.431210][T14072] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3025.439953][T14072] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3025.595169][T26985] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3025.605470][T26985] CPU: 0 PID: 26985 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3025.613442][T26985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3025.623483][T26985] Call Trace: [ 3025.626786][T26985] dump_stack+0x1d8/0x2f8 [ 3025.631092][T26985] dump_header+0xd8/0x960 [ 3025.635399][T26985] oom_kill_process+0xcd/0x350 [ 3025.640145][T26985] out_of_memory+0x5c8/0x880 [ 3025.644748][T26985] memory_max_write+0x4ba/0x600 [ 3025.649612][T26985] ? memory_max_show+0xa0/0xa0 [ 3025.654373][T26985] cgroup_file_write+0x223/0x5f0 [ 3025.659305][T26985] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3025.664422][T26985] kernfs_fop_write+0x3e4/0x4f0 [ 3025.669263][T26985] ? kernfs_fop_read+0x580/0x580 [ 3025.674185][T26985] __vfs_write+0xb8/0x740 [ 3025.678555][T26985] ? check_preemption_disabled+0x47/0x2a0 [ 3025.684278][T26985] ? __sb_start_write+0x403/0x4c0 [ 3025.689291][T26985] vfs_write+0x275/0x590 [ 3025.693533][T26985] ksys_write+0x117/0x220 [ 3025.697849][T26985] __x64_sys_write+0x7b/0x90 [ 3025.702426][T26985] do_syscall_64+0xfe/0x140 [ 3025.706915][T26985] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3025.712790][T26985] RIP: 0033:0x459829 [ 3025.716685][T26985] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3025.736359][T26985] RSP: 002b:00007f5d37d32c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3025.744782][T26985] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 3025.752750][T26985] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 3025.760704][T26985] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 3025.768651][T26985] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d37d336d4 [ 3025.776600][T26985] R13: 00000000004c98fc R14: 00000000004e0ea8 R15: 00000000ffffffff [ 3025.784633][T26985] memory: usage 5436kB, limit 0kB, failcnt 3119847 [ 3025.791130][T26985] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3025.799480][T26985] Memory cgroup stats for /syz2: [ 3025.799572][T26985] anon 4296704 [ 3025.799572][T26985] file 143360 [ 3025.799572][T26985] kernel_stack 65536 [ 3025.799572][T26985] slab 987136 [ 3025.799572][T26985] sock 0 [ 3025.799572][T26985] shmem 0 [ 3025.799572][T26985] file_mapped 0 [ 3025.799572][T26985] file_dirty 0 [ 3025.799572][T26985] file_writeback 0 [ 3025.799572][T26985] anon_thp 4194304 [ 3025.799572][T26985] inactive_anon 0 [ 3025.799572][T26985] active_anon 4296704 [ 3025.799572][T26985] inactive_file 0 [ 3025.799572][T26985] active_file 0 [ 3025.799572][T26985] unevictable 0 [ 3025.799572][T26985] slab_reclaimable 270336 [ 3025.799572][T26985] slab_unreclaimable 716800 [ 3025.799572][T26985] pgfault 208692 [ 3025.799572][T26985] pgmajfault 0 [ 3025.799572][T26985] workingset_refault 0 [ 3025.799572][T26985] workingset_activate 0 [ 3025.799572][T26985] workingset_nodereclaim 0 [ 3025.799572][T26985] pgrefill 0 [ 3025.799572][T26985] pgscan 2083 [ 3025.799572][T26985] pgsteal 2083 [ 3025.799572][T26985] pgactivate 0 22:55:13 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e21, @initdev}, 0x3) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4e7c16a6e1ec3bb2b532006c050000000000000401641005118801000000380000ca58d5003eb2030a000008000000000000"], 0x9e) 22:55:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) [ 3025.896754][T26985] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=26982,uid=0 [ 3025.912354][T26985] Memory cgroup out of memory: Killed process 26982 (syz-executor.2) total-vm:72712kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB [ 3025.928806][ T1058] oom_reaper: reaped process 26982 (syz-executor.2), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB 22:55:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) 22:55:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r1) tkill(0x0, 0x9) [ 3025.949421][T26976] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 3025.972283][T26976] CPU: 1 PID: 26976 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3025.980389][T26976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3025.990443][T26976] Call Trace: [ 3025.993729][T26976] dump_stack+0x1d8/0x2f8 [ 3025.998049][T26976] dump_header+0xd8/0x960 [ 3026.002370][T26976] oom_kill_process+0xcd/0x350 [ 3026.007126][T26976] out_of_memory+0x5c8/0x880 [ 3026.011707][T26976] try_charge+0x125a/0x1910 [ 3026.016243][T26976] mem_cgroup_try_charge+0x20c/0x680 [ 3026.021518][T26976] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3026.027138][T26976] handle_mm_fault+0x312f/0x6010 [ 3026.032073][T26976] do_user_addr_fault+0x589/0xaf0 [ 3026.037086][T26976] __do_page_fault+0xd3/0x1f0 [ 3026.041746][T26976] do_page_fault+0x99/0xb0 [ 3026.046152][T26976] page_fault+0x39/0x40 [ 3026.050286][T26976] RIP: 0033:0x4577c1 [ 3026.054166][T26976] Code: 48 81 ec 98 00 00 00 0f 05 48 3d 00 f0 ff ff 48 89 c3 0f 87 e9 00 00 00 85 db 0f 88 2f 01 00 00 48 89 e2 89 de bf 01 00 00 00 ba 13 00 00 85 c0 0f 88 98 00 00 00 8b 44 24 18 25 00 f0 00 00 [ 3026.073760][T26976] RSP: 002b:00007ffec8d1ff70 EFLAGS: 00010206 [ 3026.079832][T26976] RAX: 0000000000000003 RBX: 0000000000000003 RCX: 00000000004577a0 [ 3026.087807][T26976] RDX: 00007ffec8d1ff70 RSI: 0000000000000003 RDI: 0000000000000001 22:55:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) [ 3026.095767][T26976] RBP: 0000000000000002 R08: 0000000000000001 R09: 00005555556d5940 [ 3026.103726][T26976] R10: 0000000000000000 R11: 0000000000000202 R12: 00007ffec8d21150 [ 3026.111683][T26976] R13: 00007ffec8d21140 R14: 0000000000000000 R15: 00007ffec8d21150 22:55:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) openat$cgroup_ro(r1, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x0, 0x0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) 22:55:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) [ 3026.276018][T26976] memory: usage 1000kB, limit 0kB, failcnt 3119855 [ 3026.297834][T26976] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3026.325615][T26976] Memory cgroup stats for /syz2: [ 3026.325699][T26976] anon 69632 [ 3026.325699][T26976] file 143360 [ 3026.325699][T26976] kernel_stack 0 [ 3026.325699][T26976] slab 987136 [ 3026.325699][T26976] sock 0 [ 3026.325699][T26976] shmem 0 [ 3026.325699][T26976] file_mapped 0 [ 3026.325699][T26976] file_dirty 0 [ 3026.325699][T26976] file_writeback 0 [ 3026.325699][T26976] anon_thp 0 [ 3026.325699][T26976] inactive_anon 0 [ 3026.325699][T26976] active_anon 69632 [ 3026.325699][T26976] inactive_file 0 [ 3026.325699][T26976] active_file 0 22:55:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x215) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f4529460000491e76f676e95161614ce6f0003204e300000000000000000164100511660100000038000000000000000900000b0100"], 0x9e) [ 3026.325699][T26976] unevictable 0 [ 3026.325699][T26976] slab_reclaimable 270336 [ 3026.325699][T26976] slab_unreclaimable 716800 [ 3026.325699][T26976] pgfault 208692 [ 3026.325699][T26976] pgmajfault 0 [ 3026.325699][T26976] workingset_refault 0 [ 3026.325699][T26976] workingset_activate 0 [ 3026.325699][T26976] workingset_nodereclaim 0 [ 3026.325699][T26976] pgrefill 0 [ 3026.325699][T26976] pgscan 2083 [ 3026.325699][T26976] pgsteal 2083 [ 3026.325699][T26976] pgactivate 0 [ 3026.422419][T26976] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=26976,uid=0 [ 3026.459764][T26976] Memory cgroup out of memory: Killed process 26976 (syz-executor.2) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 3026.476696][ T1058] oom_reaper: reaped process 26976 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 22:55:14 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:14 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) 22:55:14 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xe4, 0x14000) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f00000000c0)={'bcsh0\x00', {0x2, 0x4e22, @multicast2}}) r1 = socket$inet_udp(0x2, 0x2, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x101000, 0x0) close(r1) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="4ef27f4529733e59e67a7e4600000000000001641040cd660100000038000000000000000900000be2ffffffffffffff000000000000d6370d1a76b83a56cc5cbd73cc10bf7d1ed23bdaed1ced7506041a7d1ab273d6758b51836262338de8f4d0786ac8c8fa474a4e9ccbfbaacf2745ed8149f6771e9f7bb8ae9a760fd39f93a757d0033cac12a038a102f57a183771e768775ae246551e6a6db42ec921b2"], 0x9e) 22:55:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r1) tkill(r1, 0x0) 22:55:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) 22:55:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000040)={0xa, 0x4, 0x100, 0x3}, 0xa) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) 22:55:14 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:14 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) 22:55:14 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000000)={0x4, 0x4, 0x26f, 0x7, 0x8000, 0x5, 0x9}) 22:55:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) 22:55:14 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r1) tkill(r1, 0x0) 22:55:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000540)='/dev/audio\x00', 0x2, 0x0) connect$pppoe(r1, &(0x7f0000000580)={0x18, 0x0, {0x3, @random="76d531e631e0", 'bridge_slave_0\x00'}}, 0x1e) fstatfs(r0, &(0x7f0000000300)=""/207) close(r0) r2 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="4ef27f45294600000032006c050000000000000001641005116601000000380000000000f7000900000b3d49de74000000000000000000003abdf96900da6e016ecfe65b4bf2c48a0c95148463d144e9f47553c6ede7f19c76c9c505baf6414017acd8a4e3f168b0c056d5be2d3f37896b316fed5c6d3fd3a8448f49f603111109ab56974a8a4f93c0dbf98895a67f4a6d20fcb51a9814ea9496258867945d73ad45743229c47b259b0bd71285f4580543877cd0082fee8e824d5f7959bf15994e2ca936b22712cc68efbeaed16f204f65078ae0550cbd042d25aba0dcc52fe743809c16dbf7b554a676e2f22702ea"], 0x9e) timer_create(0x7, &(0x7f0000000040)={0x0, 0x1c, 0x1, @thr={&(0x7f0000000100)="69f1e28259613c01ffaeb62578163991f0cfc359da5ef1ffee63e256479306b160dc824c46c6c7cc8d988e89477f92b8196e5ef64baa500dcae364bd1efbfd28497006842ac24443e0328ff2058914eda0052c8756d5ddccf3d2e4d38dfac5cea2c6cea99f6f7d7af24d48b0761de5256f4555d7a989adcea7ccd8271b675b1d2028c12e140dd81774", &(0x7f0000000240)="d8bbf05804ae4052333c5b35be509a9ae6b457d558d9ef15ba78340706fe9b56860c60e56fcb1c3911dc5d08f57920d269079caa7bc68f1d857774c5e2ac6087ee9df86e6fad7b8f730d586e87e6f977b0458b0f0ca51e047bb05d490ce07b6ec70c827d829324fd030b4870ae0edb8c7a64fd157372e11eb9d6548af288da710622b57348e70fb5bd334e"}}, &(0x7f0000000080)=0x0) timer_gettime(r3, &(0x7f00000001c0)) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000000c0)={r0, 0x0, 0x81, 0xd41, 0x30d}) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000000)={0x3, 'rose0\x00', 0x4}, 0x18) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000400)={0xfffffffffffffffa}, 0x4) 22:55:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) [ 3027.943893][T10708] device bridge_slave_1 left promiscuous mode [ 3027.950108][T10708] bridge0: port 2(bridge_slave_1) entered disabled state [ 3028.003568][T10708] device bridge_slave_0 left promiscuous mode [ 3028.009835][T10708] bridge0: port 1(bridge_slave_0) entered disabled state [ 3028.752907][T10708] device hsr_slave_0 left promiscuous mode [ 3028.802438][T10708] device hsr_slave_1 left promiscuous mode [ 3028.866719][T10708] team0 (unregistering): Port device team_slave_1 removed [ 3028.877103][T10708] team0 (unregistering): Port device team_slave_0 removed [ 3028.886933][T10708] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3028.955836][T10708] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3029.036362][T10708] bond0 (unregistering): Released all slaves [ 3029.158236][T27809] IPVS: ftp: loaded support on port[0] = 21 [ 3029.205211][T27809] chnl_net:caif_netlink_parms(): no params data found [ 3029.231263][T27809] bridge0: port 1(bridge_slave_0) entered blocking state [ 3029.238562][T27809] bridge0: port 1(bridge_slave_0) entered disabled state [ 3029.246241][T27809] device bridge_slave_0 entered promiscuous mode [ 3029.254002][T27809] bridge0: port 2(bridge_slave_1) entered blocking state [ 3029.261049][T27809] bridge0: port 2(bridge_slave_1) entered disabled state [ 3029.268832][T27809] device bridge_slave_1 entered promiscuous mode [ 3029.284760][T27809] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3029.296599][T27809] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3029.312573][T27809] team0: Port device team_slave_0 added [ 3029.319003][T27809] team0: Port device team_slave_1 added [ 3029.353807][T27809] device hsr_slave_0 entered promiscuous mode [ 3029.402721][T27809] device hsr_slave_1 entered promiscuous mode [ 3029.462512][T27809] debugfs: Directory 'hsr0' with parent '/' already present! [ 3029.512545][T27809] bridge0: port 2(bridge_slave_1) entered blocking state [ 3029.519625][T27809] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3029.527020][T27809] bridge0: port 1(bridge_slave_0) entered blocking state [ 3029.534110][T27809] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3029.577526][T27809] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3029.593783][T10691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3029.602072][T10691] bridge0: port 1(bridge_slave_0) entered disabled state [ 3029.612110][T10691] bridge0: port 2(bridge_slave_1) entered disabled state [ 3029.627983][T27809] 8021q: adding VLAN 0 to HW filter on device team0 [ 3029.638964][T10691] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3029.650773][T10691] bridge0: port 1(bridge_slave_0) entered blocking state [ 3029.657878][T10691] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3029.686155][T10691] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3029.695568][T10691] bridge0: port 2(bridge_slave_1) entered blocking state [ 3029.702668][T10691] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3029.714128][T10691] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3029.725592][T10691] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3029.739533][T27809] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3029.753327][T27809] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3029.767974][T14072] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3029.777181][T14072] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3029.787963][T14072] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3029.810463][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3029.824030][T27809] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3029.962133][T27819] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3029.973520][T27819] CPU: 0 PID: 27819 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3029.981509][T27819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3029.991553][T27819] Call Trace: [ 3029.994853][T27819] dump_stack+0x1d8/0x2f8 [ 3029.999196][T27819] dump_header+0xd8/0x960 [ 3030.003523][T27819] oom_kill_process+0xcd/0x350 [ 3030.008284][T27819] out_of_memory+0x5c8/0x880 [ 3030.012862][T27819] memory_max_write+0x4ba/0x600 [ 3030.017707][T27819] ? memory_max_show+0xa0/0xa0 [ 3030.022452][T27819] cgroup_file_write+0x223/0x5f0 [ 3030.027400][T27819] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3030.032507][T27819] kernfs_fop_write+0x3e4/0x4f0 [ 3030.037455][T27819] ? kernfs_fop_read+0x580/0x580 [ 3030.042374][T27819] __vfs_write+0xb8/0x740 [ 3030.046699][T27819] ? check_preemption_disabled+0x47/0x2a0 [ 3030.052403][T27819] ? __sb_start_write+0x403/0x4c0 [ 3030.057417][T27819] vfs_write+0x275/0x590 [ 3030.061635][T27819] ksys_write+0x117/0x220 [ 3030.065966][T27819] __x64_sys_write+0x7b/0x90 [ 3030.070536][T27819] do_syscall_64+0xfe/0x140 [ 3030.075050][T27819] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3030.080915][T27819] RIP: 0033:0x459829 [ 3030.084800][T27819] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3030.104384][T27819] RSP: 002b:00007f7ba194ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3030.112770][T27819] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 3030.120715][T27819] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 3030.128746][T27819] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 3030.136713][T27819] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7ba194b6d4 [ 3030.144666][T27819] R13: 00000000004c98fc R14: 00000000004e0ea8 R15: 00000000ffffffff [ 3030.158020][T27819] memory: usage 5448kB, limit 0kB, failcnt 3119863 [ 3030.165074][T27819] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3030.171986][T27819] Memory cgroup stats for /syz2: [ 3030.172059][T27819] anon 4308992 [ 3030.172059][T27819] file 143360 [ 3030.172059][T27819] kernel_stack 65536 [ 3030.172059][T27819] slab 987136 [ 3030.172059][T27819] sock 0 [ 3030.172059][T27819] shmem 0 [ 3030.172059][T27819] file_mapped 0 [ 3030.172059][T27819] file_dirty 0 [ 3030.172059][T27819] file_writeback 0 [ 3030.172059][T27819] anon_thp 4194304 [ 3030.172059][T27819] inactive_anon 0 [ 3030.172059][T27819] active_anon 4308992 [ 3030.172059][T27819] inactive_file 0 [ 3030.172059][T27819] active_file 0 [ 3030.172059][T27819] unevictable 0 [ 3030.172059][T27819] slab_reclaimable 270336 [ 3030.172059][T27819] slab_unreclaimable 716800 [ 3030.172059][T27819] pgfault 208725 [ 3030.172059][T27819] pgmajfault 0 [ 3030.172059][T27819] workingset_refault 0 [ 3030.172059][T27819] workingset_activate 0 [ 3030.172059][T27819] workingset_nodereclaim 0 [ 3030.172059][T27819] pgrefill 0 [ 3030.172059][T27819] pgscan 2083 [ 3030.172059][T27819] pgsteal 2083 [ 3030.172059][T27819] pgactivate 0 [ 3030.266991][T27819] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=27816,uid=0 [ 3030.282599][T27819] Memory cgroup out of memory: Killed process 27816 (syz-executor.2) total-vm:72844kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB [ 3030.302520][ T1058] oom_reaper: reaped process 27816 (syz-executor.2), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB 22:55:17 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f452900000164100511660100000038000000000000000900000b00"/43], 0x9e) inotify_init1(0x0) 22:55:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) 22:55:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r1) tkill(r1, 0x0) [ 3030.363030][T27809] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 3030.404359][T27809] CPU: 1 PID: 27809 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3030.412381][T27809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3030.422433][T27809] Call Trace: [ 3030.422456][T27809] dump_stack+0x1d8/0x2f8 [ 3030.422472][T27809] dump_header+0xd8/0x960 [ 3030.434402][T27809] oom_kill_process+0xcd/0x350 [ 3030.434413][T27809] out_of_memory+0x5c8/0x880 [ 3030.434437][T27809] try_charge+0x125a/0x1910 [ 3030.434467][T27809] mem_cgroup_try_charge+0x20c/0x680 [ 3030.453560][T27809] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3030.453573][T27809] wp_page_copy+0x35c/0x1980 [ 3030.453588][T27809] ? trace_lock_release+0x135/0x1a0 [ 3030.463804][T27809] ? do_wp_page+0x27f/0x1cc0 [ 3030.463820][T27809] ? __kasan_check_read+0x11/0x20 [ 3030.463830][T27809] ? do_raw_spin_unlock+0x49/0x260 [ 3030.463846][T27809] do_wp_page+0x5e5/0x1cc0 [ 3030.488135][T27809] ? __kasan_check_write+0x14/0x20 [ 3030.493261][T27809] handle_mm_fault+0x2adf/0x6010 [ 3030.499734][T27809] do_user_addr_fault+0x589/0xaf0 [ 3030.504776][T27809] __do_page_fault+0xd3/0x1f0 [ 3030.509488][T27809] do_page_fault+0x99/0xb0 [ 3030.513917][T27809] page_fault+0x39/0x40 [ 3030.518068][T27809] RIP: 0033:0x430906 [ 3030.521946][T27809] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 5c 46 64 00 85 c0 0f 84 [ 3030.541543][T27809] RSP: 002b:00007fff3c236670 EFLAGS: 00010206 22:55:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)) write(0xffffffffffffffff, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) [ 3030.547598][T27809] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 3030.555554][T27809] RDX: 00005555560d7930 RSI: 00005555560df970 RDI: 0000000000000003 [ 3030.563509][T27809] RBP: 0000000000008041 R08: 0000000000000001 R09: 00005555560d6940 [ 3030.571469][T27809] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 3030.579449][T27809] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 3030.592228][T27809] memory: usage 1024kB, limit 0kB, failcnt 3119888 [ 3030.616125][T27809] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3030.624069][T27809] Memory cgroup stats for /syz2: [ 3030.624312][T27809] anon 57344 [ 3030.624312][T27809] file 143360 [ 3030.624312][T27809] kernel_stack 0 [ 3030.624312][T27809] slab 987136 [ 3030.624312][T27809] sock 0 [ 3030.624312][T27809] shmem 0 [ 3030.624312][T27809] file_mapped 0 [ 3030.624312][T27809] file_dirty 0 [ 3030.624312][T27809] file_writeback 0 [ 3030.624312][T27809] anon_thp 0 [ 3030.624312][T27809] inactive_anon 0 [ 3030.624312][T27809] active_anon 57344 [ 3030.624312][T27809] inactive_file 0 [ 3030.624312][T27809] active_file 0 [ 3030.624312][T27809] unevictable 0 [ 3030.624312][T27809] slab_reclaimable 270336 [ 3030.624312][T27809] slab_unreclaimable 716800 [ 3030.624312][T27809] pgfault 208758 [ 3030.624312][T27809] pgmajfault 0 [ 3030.624312][T27809] workingset_refault 0 [ 3030.624312][T27809] workingset_activate 0 [ 3030.624312][T27809] workingset_nodereclaim 0 [ 3030.624312][T27809] pgrefill 0 [ 3030.624312][T27809] pgscan 2083 [ 3030.624312][T27809] pgsteal 2083 22:55:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)) write(0xffffffffffffffff, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) 22:55:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, 0x0, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) [ 3030.624312][T27809] pgactivate 0 22:55:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001900)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000001a00)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x401000}, 0xc, &(0x7f00000019c0)={&(0x7f0000000580)=ANY=[@ANYRES32=r3, @ANYBLOB], 0x2}, 0x1, 0x0, 0x0, 0x4001}, 0x4004) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)) prctl$PR_GET_FP_MODE(0x2e) unlink(&(0x7f0000000280)='./bus\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, 0x0, &(0x7f0000000380)) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f00000003c0)={@remote, 0x6b}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x1600, 0x3ef, 0x2000000, 0x3f00000000000000, 0x100000000000600, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) prctl$PR_GET_FP_MODE(0x2e) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) ftruncate(0xffffffffffffffff, 0xa48204) stat(&(0x7f0000000780)='./bus\x00', &(0x7f00000007c0)) fstat(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(0x0, 0x0, r5) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80841000}, 0xc, &(0x7f0000000500)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[], 0x0) [ 3030.851033][T27809] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=27809,uid=0 [ 3030.870377][T27809] Memory cgroup out of memory: Killed process 27809 (syz-executor.2) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 3030.888286][ T1058] oom_reaper: reaped process 27809 (syz-executor.2), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 22:55:18 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)) write(0xffffffffffffffff, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) 22:55:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, 0x0, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r1, &(0x7f0000000200)={0x2, 0x4, @initdev}, 0xffffffffffffff82) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) 22:55:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, 0x0, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, 0x0, 0x0) tkill(r1, 0x9) 22:55:18 executing program 3: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x4, 0x5db, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000140], 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]}, 0x653) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f0000000000)=[{{0x0, 0x7530}}], 0xfe72) 22:55:18 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x20, 0x80) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000040)={0x4, 0x3, 0xd5, &(0x7f0000000100)="fe847983e2f29a4cdbb37149cd67e4ff2eec4f75266b48abe4150805027ef0ea5114b06d9efc6cfc6aef82488ab98a599486c7f5a83ef6a09acd41c50b2cc00227e82514560f9dd628b855bd491f97b55c2e9e95933633d2cc86e7cca33861b002b416fc11c3db8de41e3b21f87eb5c291fe2718f8be16a5b048e24769b10a6c3e9c842a7a0f230023e17602c02721ae0800d8d6490f75369d9f0d0aa4feb0a2ed54963d471c01fc36105752bc399c2f5dd947ff04b983e2eb936a37f7f6bc4f928bf5a76fa5f3c33bef46713487cf2dc61603122b"}) 22:55:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, 0x0, 0x0) tkill(r1, 0x9) 22:55:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\x00', 0x10) socket$packet(0x11, 0x0, 0x300) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x65) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x2, 0x0) write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7, 0x7f, 0x1}, 0x7) 22:55:19 executing program 3: r0 = socket$kcm(0x29, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={0x0, 0x0, 0xffffffffffffffff}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) unlink(&(0x7f0000000700)='./file0\x00') write$cgroup_subtree(r1, &(0x7f0000001b80)={[{0x2f, 'rdma'}, {0x2b, 'pids'}]}, 0xc) sendmsg$kcm(r0, &(0x7f00000006c0)={&(0x7f0000000540)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @remote}, 0x0, 0x0, 0x4, 0x3}}, 0x80, &(0x7f0000000680)=[{&(0x7f00000005c0)="4cd576c630fdd33bd113e187589e95481c402e26b2dadcb448bdcd3c6aacc7d6644832cccfa7ee53703ccfc8a5a8c1667cda828f4a1bf6e08ec72b5dd495c5391897851c6431b69a", 0x48}, {&(0x7f0000000640)="f2e593459e20cf95f4dfc19affd7e51c846492ff0d1e52bbb8fbb2d592faab", 0x1f}], 0x2}, 0x20004000) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) recvmsg(r1, 0x0, 0x2000) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) r4 = gettid() perf_event_open(&(0x7f00000004c0)={0x7, 0x70, 0x8, 0x6, 0x8001, 0x8, 0x0, 0x3, 0x2000, 0x2, 0x9, 0x800000000, 0x2, 0x2, 0x4, 0x1cf, 0x4, 0x1, 0x0, 0x8, 0x3, 0x1, 0x6, 0x400, 0x81, 0xca7f, 0x7, 0xa0a5, 0xb5a3, 0x0, 0x2, 0x2, 0x3ff, 0xfffffffffffffffb, 0x10001, 0x9, 0x7, 0x401, 0x0, 0x1, 0x2, @perf_config_ext={0x1ff, 0x40}, 0x2000, 0xfffffffffffffff7, 0x2, 0x8, 0x27, 0x4, 0x80}, r4, 0x3, r1, 0x3) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) recvmsg$kcm(r1, &(0x7f000000bb80)={&(0x7f000000b900)=@xdp, 0x80, &(0x7f000000bb40)=[{&(0x7f000000b980)=""/156, 0x9c}, {&(0x7f000000ba40)=""/223, 0xdf}], 0x2}, 0x10100) sendmsg$kcm(r0, &(0x7f0000001b40)={&(0x7f0000000740)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @empty}, 0x1, 0x4, 0x3}}, 0x80, &(0x7f0000001ac0)=[{&(0x7f00000007c0)="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", 0x1000}, {&(0x7f00000017c0)="a5d6cd0dd76e5aef778cbf71c04a24e7d3719d5a66f2778dc85f6b1e23322b6d1bd4", 0x22}, {&(0x7f0000001800)="1652b544b177887e7b28fab0c417b11998690c7bb0218d2fa6b087512cfc86b969afe6c1fba5655f2c0a968377bc43b0f9354917370f6960673ef5f2559f712670844d9aed9b39294dfb771be2a59f30c731284c8a23e2b54de255cdf4c3119c28cf7915957070061f7372cdb77a016a0432372ffd8d1ed0ef19bc3def66a0e203770ed2ab8144ce0e9d6cca57ae1be30e5ec60e8628f5bd6fba6020ec75dfe00e2e1d4fcd1a7de2aa5b63e6df6fa86a4af1e1e117fc29d7eb0a987bb605dbfe652b8d5efb5fa873b10a6d95c6e5b6b5b0d19aa702bd9fa632328b7d13eda41c3346541449c26efd7a28ff3675a5c1", 0xef}, {&(0x7f0000001900)="812559edd4d65f0935356bea1414cd5a6a1a502b3dcd2e1d8dbb4723905f463f26ca2fe6c049cbd798a9bc02794e3d20caba904ec521201d029eada5fa8e442488b128d101c26c058a5d6214cbd0dfe37e6c1942ff688ab0ef6c7510", 0x5c}, {&(0x7f0000001980)="8996c4aedbe12983f0f58922572774b1dce6f51b5b749899489d1c9998ec6c3f5a99e0fe24788754eac5fc184e8eccd6700db74aa4d9f6ed4ac034f4a30ca69103260148e1fbb10b6e615db8df666cebfb96fc9fa7b84131f0adff60ca59402c17ee31da0831f0d4626e1dc7d2bad33a99bb44021f", 0x75}, {&(0x7f0000001a00)="a0c3863e43bd96c3e7317b696492411c63a8666d23605db03be0763db59769df0169cdfb1763093584cf8b706b0748ca56ec730b037f9149df8d505d6eb496f9f5d277ee60ea5aacf2902d80d99d1c5f0289f55579330044b57955be68cacdd22a75c1a385cfb212b8f70567710f4fb843c3d96bba7d68e8349b15719a924be754d9fcfabd", 0x85}], 0x6}, 0x20000001) r5 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r5, 0x0, 0x0) 22:55:19 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, 0x0, 0x0) tkill(r1, 0x9) 22:55:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4effffffff0000000032006c050000004d0010000164100511660100000038000000000000000900000bfaff0900"/56], 0x9e) [ 3032.533378][T10699] device bridge_slave_1 left promiscuous mode [ 3032.539592][T10699] bridge0: port 2(bridge_slave_1) entered disabled state [ 3032.573297][T10699] device bridge_slave_0 left promiscuous mode [ 3032.579485][T10699] bridge0: port 1(bridge_slave_0) entered disabled state [ 3033.292791][T10699] device hsr_slave_0 left promiscuous mode [ 3033.352524][T10699] device hsr_slave_1 left promiscuous mode [ 3033.398211][T10699] team0 (unregistering): Port device team_slave_1 removed [ 3033.408817][T10699] team0 (unregistering): Port device team_slave_0 removed [ 3033.419282][T10699] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3033.456011][T10699] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3033.530563][T10699] bond0 (unregistering): Released all slaves [ 3033.648776][T28529] IPVS: ftp: loaded support on port[0] = 21 [ 3033.701974][T28529] chnl_net:caif_netlink_parms(): no params data found [ 3033.727594][T28529] bridge0: port 1(bridge_slave_0) entered blocking state [ 3033.734808][T28529] bridge0: port 1(bridge_slave_0) entered disabled state [ 3033.742651][T28529] device bridge_slave_0 entered promiscuous mode [ 3033.750153][T28529] bridge0: port 2(bridge_slave_1) entered blocking state [ 3033.757955][T28529] bridge0: port 2(bridge_slave_1) entered disabled state [ 3033.766833][T28529] device bridge_slave_1 entered promiscuous mode [ 3033.781741][T28529] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3033.792360][T28529] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3033.807344][T28529] team0: Port device team_slave_0 added [ 3033.814377][T28529] team0: Port device team_slave_1 added [ 3033.893700][T28529] device hsr_slave_0 entered promiscuous mode [ 3033.942770][T28529] device hsr_slave_1 entered promiscuous mode [ 3033.982404][T28529] debugfs: Directory 'hsr0' with parent '/' already present! [ 3034.034075][T28529] bridge0: port 2(bridge_slave_1) entered blocking state [ 3034.041160][T28529] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3034.048539][T28529] bridge0: port 1(bridge_slave_0) entered blocking state [ 3034.055650][T28529] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3034.098026][T28529] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3034.114060][T10691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3034.125373][T10691] bridge0: port 1(bridge_slave_0) entered disabled state [ 3034.133519][T10691] bridge0: port 2(bridge_slave_1) entered disabled state [ 3034.148818][T28529] 8021q: adding VLAN 0 to HW filter on device team0 [ 3034.160673][T10691] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3034.171639][T10691] bridge0: port 1(bridge_slave_0) entered blocking state [ 3034.178746][T10691] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3034.204956][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3034.214132][ T9644] bridge0: port 2(bridge_slave_1) entered blocking state [ 3034.221187][ T9644] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3034.229478][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3034.243027][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3034.251444][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3034.265844][T28529] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3034.280562][T28529] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3034.289329][T10691] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3034.300541][T10691] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3034.320358][T28529] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3034.481094][T28538] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3034.494292][T28538] CPU: 0 PID: 28538 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3034.502279][T28538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3034.513314][T28538] Call Trace: [ 3034.516603][T28538] dump_stack+0x1d8/0x2f8 [ 3034.520927][T28538] dump_header+0xd8/0x960 [ 3034.525263][T28538] oom_kill_process+0xcd/0x350 [ 3034.530011][T28538] out_of_memory+0x5c8/0x880 [ 3034.534604][T28538] memory_max_write+0x4ba/0x600 [ 3034.539458][T28538] ? memory_max_show+0xa0/0xa0 [ 3034.544235][T28538] cgroup_file_write+0x223/0x5f0 [ 3034.549151][T28538] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3034.554242][T28538] kernfs_fop_write+0x3e4/0x4f0 [ 3034.559072][T28538] ? kernfs_fop_read+0x580/0x580 [ 3034.563989][T28538] __vfs_write+0xb8/0x740 [ 3034.568326][T28538] ? check_preemption_disabled+0x47/0x2a0 [ 3034.574031][T28538] ? __sb_start_write+0x403/0x4c0 [ 3034.579049][T28538] vfs_write+0x275/0x590 [ 3034.583271][T28538] ksys_write+0x117/0x220 [ 3034.587587][T28538] __x64_sys_write+0x7b/0x90 [ 3034.592158][T28538] do_syscall_64+0xfe/0x140 [ 3034.596639][T28538] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3034.602530][T28538] RIP: 0033:0x459829 [ 3034.606398][T28538] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3034.626006][T28538] RSP: 002b:00007ff0a385fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3034.634408][T28538] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 3034.642362][T28538] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 3034.650313][T28538] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 3034.658266][T28538] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff0a38606d4 [ 3034.666220][T28538] R13: 00000000004c98fc R14: 00000000004e0ea8 R15: 00000000ffffffff [ 3034.675733][T28538] memory: usage 5460kB, limit 0kB, failcnt 3119889 [ 3034.682268][T28538] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3034.689548][T28538] Memory cgroup stats for /syz2: [ 3034.689603][T28538] anon 4313088 [ 3034.689603][T28538] file 143360 [ 3034.689603][T28538] kernel_stack 65536 [ 3034.689603][T28538] slab 987136 [ 3034.689603][T28538] sock 0 [ 3034.689603][T28538] shmem 0 [ 3034.689603][T28538] file_mapped 0 [ 3034.689603][T28538] file_dirty 0 [ 3034.689603][T28538] file_writeback 0 [ 3034.689603][T28538] anon_thp 4194304 [ 3034.689603][T28538] inactive_anon 0 [ 3034.689603][T28538] active_anon 4313088 [ 3034.689603][T28538] inactive_file 0 [ 3034.689603][T28538] active_file 0 [ 3034.689603][T28538] unevictable 0 [ 3034.689603][T28538] slab_reclaimable 270336 [ 3034.689603][T28538] slab_unreclaimable 716800 [ 3034.689603][T28538] pgfault 208824 [ 3034.689603][T28538] pgmajfault 0 [ 3034.689603][T28538] workingset_refault 0 [ 3034.689603][T28538] workingset_activate 0 [ 3034.689603][T28538] workingset_nodereclaim 0 [ 3034.689603][T28538] pgrefill 0 [ 3034.689603][T28538] pgscan 2083 [ 3034.689603][T28538] pgsteal 2083 22:55:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000), 0x43578cf5) tkill(0x0, 0x9) 22:55:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f0000000380)={0xbb, 0x89d0, 0xca3, 0x8, 0x0, 0x9}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x48b00, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e23, @multicast1}, @in={0x2, 0x4e20, @remote}, @in6={0xa, 0x4e20, 0x6, @local, 0x1}, @in={0x2, 0x4e24, @multicast1}], 0x5c) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f00000000c0)={'netdevsim0\x00', {0x2, 0x4e21, @local}}) syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0xffffffffffffff19, 0x40) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xe, 0x40010, r3, 0x8000000) write$P9_RSTAT(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="5b0000007d010700000000000003000010020500000004000000010001000400000000000b006970365f7674693000200016002f76626f786e65743163707573657481726f632525230000f2db66f4d99ee0f54d3f1d007b64f89fba10d5dd2fbe9bbf285ce8f1ca8f88f255acfe2b2adca5190f87f2953e60a06f2c022aab32a4bc84ebd2dd1efc28ef2ecb3ca2c26a0687681bbe1c319c49fc5da17e9e3fbe79fe0eb05a9e6d3eb693196c9f1514a6c96bc1e0854865a022b7118427da3306a023b75e43340f5c56276aa2d69dded443e863ce300975fdc5ae90c39166661c65abac2472b36286ecccd9f180c4342ded6fe9f8356590edd8e63f37770fa9250abc"], 0x5b) 22:55:22 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:22 executing program 3: r0 = socket$kcm(0x29, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={0x0, 0x0, 0xffffffffffffffff}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) unlink(&(0x7f0000000700)='./file0\x00') write$cgroup_subtree(r1, &(0x7f0000001b80)={[{0x2f, 'rdma'}, {0x2b, 'pids'}]}, 0xc) sendmsg$kcm(r0, &(0x7f00000006c0)={&(0x7f0000000540)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @remote}, 0x0, 0x0, 0x4, 0x3}}, 0x80, &(0x7f0000000680)=[{&(0x7f00000005c0)="4cd576c630fdd33bd113e187589e95481c402e26b2dadcb448bdcd3c6aacc7d6644832cccfa7ee53703ccfc8a5a8c1667cda828f4a1bf6e08ec72b5dd495c5391897851c6431b69a", 0x48}, {&(0x7f0000000640)="f2e593459e20cf95f4dfc19affd7e51c846492ff0d1e52bbb8fbb2d592faab", 0x1f}], 0x2}, 0x20004000) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) recvmsg(r1, 0x0, 0x2000) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) r4 = gettid() perf_event_open(&(0x7f00000004c0)={0x7, 0x70, 0x8, 0x6, 0x8001, 0x8, 0x0, 0x3, 0x2000, 0x2, 0x9, 0x800000000, 0x2, 0x2, 0x4, 0x1cf, 0x4, 0x1, 0x0, 0x8, 0x3, 0x1, 0x6, 0x400, 0x81, 0xca7f, 0x7, 0xa0a5, 0xb5a3, 0x0, 0x2, 0x2, 0x3ff, 0xfffffffffffffffb, 0x10001, 0x9, 0x7, 0x401, 0x0, 0x1, 0x2, @perf_config_ext={0x1ff, 0x40}, 0x2000, 0xfffffffffffffff7, 0x2, 0x8, 0x27, 0x4, 0x80}, r4, 0x3, r1, 0x3) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) recvmsg$kcm(r1, &(0x7f000000bb80)={&(0x7f000000b900)=@xdp, 0x80, &(0x7f000000bb40)=[{&(0x7f000000b980)=""/156, 0x9c}, {&(0x7f000000ba40)=""/223, 0xdf}], 0x2}, 0x10100) sendmsg$kcm(r0, &(0x7f0000001b40)={&(0x7f0000000740)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @empty}, 0x1, 0x4, 0x3}}, 0x80, &(0x7f0000001ac0)=[{&(0x7f00000007c0)="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", 0x1000}, {&(0x7f00000017c0)="a5d6cd0dd76e5aef778cbf71c04a24e7d3719d5a66f2778dc85f6b1e23322b6d1bd4", 0x22}, {&(0x7f0000001800)="1652b544b177887e7b28fab0c417b11998690c7bb0218d2fa6b087512cfc86b969afe6c1fba5655f2c0a968377bc43b0f9354917370f6960673ef5f2559f712670844d9aed9b39294dfb771be2a59f30c731284c8a23e2b54de255cdf4c3119c28cf7915957070061f7372cdb77a016a0432372ffd8d1ed0ef19bc3def66a0e203770ed2ab8144ce0e9d6cca57ae1be30e5ec60e8628f5bd6fba6020ec75dfe00e2e1d4fcd1a7de2aa5b63e6df6fa86a4af1e1e117fc29d7eb0a987bb605dbfe652b8d5efb5fa873b10a6d95c6e5b6b5b0d19aa702bd9fa632328b7d13eda41c3346541449c26efd7a28ff3675a5c1", 0xef}, {&(0x7f0000001900)="812559edd4d65f0935356bea1414cd5a6a1a502b3dcd2e1d8dbb4723905f463f26ca2fe6c049cbd798a9bc02794e3d20caba904ec521201d029eada5fa8e442488b128d101c26c058a5d6214cbd0dfe37e6c1942ff688ab0ef6c7510", 0x5c}, {&(0x7f0000001980)="8996c4aedbe12983f0f58922572774b1dce6f51b5b749899489d1c9998ec6c3f5a99e0fe24788754eac5fc184e8eccd6700db74aa4d9f6ed4ac034f4a30ca69103260148e1fbb10b6e615db8df666cebfb96fc9fa7b84131f0adff60ca59402c17ee31da0831f0d4626e1dc7d2bad33a99bb44021f", 0x75}, {&(0x7f0000001a00)="a0c3863e43bd96c3e7317b696492411c63a8666d23605db03be0763db59769df0169cdfb1763093584cf8b706b0748ca56ec730b037f9149df8d505d6eb496f9f5d277ee60ea5aacf2902d80d99d1c5f0289f55579330044b57955be68cacdd22a75c1a385cfb212b8f70567710f4fb843c3d96bba7d68e8349b15719a924be754d9fcfabd", 0x85}], 0x6}, 0x20000001) r5 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r5, 0x0, 0x0) [ 3034.689603][T28538] pgactivate 0 [ 3034.785642][T28538] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=28535,uid=0 [ 3034.801567][T28538] Memory cgroup out of memory: Killed process 28535 (syz-executor.2) total-vm:72712kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB [ 3034.817095][ T1058] oom_reaper: reaped process 28535 (syz-executor.2), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB [ 3034.849041][T28529] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 3034.892388][T28529] CPU: 0 PID: 28529 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3034.900406][T28529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3034.910639][T28529] Call Trace: [ 3034.913961][T28529] dump_stack+0x1d8/0x2f8 [ 3034.918300][T28529] dump_header+0xd8/0x960 [ 3034.922629][T28529] oom_kill_process+0xcd/0x350 [ 3034.927515][T28529] out_of_memory+0x5c8/0x880 [ 3034.932112][T28529] try_charge+0x125a/0x1910 [ 3034.936636][T28529] mem_cgroup_try_charge+0x20c/0x680 [ 3034.941938][T28529] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3034.947575][T28529] handle_mm_fault+0x312f/0x6010 [ 3034.952516][T28529] do_user_addr_fault+0x589/0xaf0 [ 3034.957533][T28529] __do_page_fault+0xd3/0x1f0 [ 3034.962195][T28529] do_page_fault+0x99/0xb0 [ 3034.966605][T28529] page_fault+0x39/0x40 [ 3034.970746][T28529] RIP: 0033:0x4577c1 22:55:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="6000002200000427bdb713f8b4d82a9217dd4671b37000ffdbdf25140000004c001f00a0cc3fa919a00e7fb074b1bbc9f5dd7d5f82c331d5a344ee018daf1597d8b8b9bc3f960b44c59e6c272b223808670700000076e803cbf343a219a0d082e8de7434fc7d41f40a4f5400"], 0x60}, 0x1, 0x0, 0x0, 0x40}, 0x8000) close(r0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) [ 3034.974628][T28529] Code: 48 81 ec 98 00 00 00 0f 05 48 3d 00 f0 ff ff 48 89 c3 0f 87 e9 00 00 00 85 db 0f 88 2f 01 00 00 48 89 e2 89 de bf 01 00 00 00 ba 13 00 00 85 c0 0f 88 98 00 00 00 8b 44 24 18 25 00 f0 00 00 [ 3034.994224][T28529] RSP: 002b:00007ffc58353fb0 EFLAGS: 00010206 [ 3035.000280][T28529] RAX: 0000000000000003 RBX: 0000000000000003 RCX: 00000000004577a0 [ 3035.008260][T28529] RDX: 00007ffc58353fb0 RSI: 0000000000000003 RDI: 0000000000000001 [ 3035.016221][T28529] RBP: 0000000000000002 R08: 0000000000000001 R09: 00005555571b2940 [ 3035.024183][T28529] R10: 0000000000000000 R11: 0000000000000202 R12: 00007ffc58355190 [ 3035.032140][T28529] R13: 00007ffc58355180 R14: 0000000000000000 R15: 00007ffc58355190 22:55:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x80, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)={0x148, r2, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6660}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x40}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x17}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x101}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x81}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xdc3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK={0x74, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2aa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x4000}, 0x0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) [ 3035.132545][T28529] memory: usage 1028kB, limit 0kB, failcnt 3119897 [ 3035.141390][T28529] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 22:55:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) [ 3035.174280][T28529] Memory cgroup stats for /syz2: [ 3035.174355][T28529] anon 69632 [ 3035.174355][T28529] file 143360 [ 3035.174355][T28529] kernel_stack 0 [ 3035.174355][T28529] slab 987136 [ 3035.174355][T28529] sock 0 [ 3035.174355][T28529] shmem 0 [ 3035.174355][T28529] file_mapped 0 [ 3035.174355][T28529] file_dirty 0 [ 3035.174355][T28529] file_writeback 0 [ 3035.174355][T28529] anon_thp 0 [ 3035.174355][T28529] inactive_anon 0 [ 3035.174355][T28529] active_anon 69632 [ 3035.174355][T28529] inactive_file 0 [ 3035.174355][T28529] active_file 0 22:55:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) [ 3035.174355][T28529] unevictable 0 [ 3035.174355][T28529] slab_reclaimable 270336 [ 3035.174355][T28529] slab_unreclaimable 716800 [ 3035.174355][T28529] pgfault 208824 [ 3035.174355][T28529] pgmajfault 0 [ 3035.174355][T28529] workingset_refault 0 [ 3035.174355][T28529] workingset_activate 0 [ 3035.174355][T28529] workingset_nodereclaim 0 [ 3035.174355][T28529] pgrefill 0 [ 3035.174355][T28529] pgscan 2083 [ 3035.174355][T28529] pgsteal 2083 [ 3035.174355][T28529] pgactivate 0 [ 3035.287827][T28529] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=28529,uid=0 [ 3035.303923][T28529] Memory cgroup out of memory: Killed process 28529 (syz-executor.2) total-vm:72448kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB 22:55:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) [ 3035.347487][ T1058] oom_reaper: reaped process 28529 (syz-executor.2), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 22:55:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000), 0x43578cf5) tkill(0x0, 0x9) 22:55:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000001180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000001240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001200)={&(0x7f00000011c0)={0x24, r1, 0x800, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x574}}, [""]}, 0x24}}, 0x4001) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e24, @initdev}, 0x8) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000bf800"/56], 0x9e) recvfrom$unix(r2, &(0x7f0000000100)=""/4096, 0x1000, 0x1, &(0x7f0000001100)=@abs={0x1, 0x0, 0x4e21}, 0x6e) 22:55:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:23 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:23 executing program 3: r0 = socket$kcm(0x29, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={0x0, 0x0, 0xffffffffffffffff}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) unlink(&(0x7f0000000700)='./file0\x00') write$cgroup_subtree(r1, &(0x7f0000001b80)={[{0x2f, 'rdma'}, {0x2b, 'pids'}]}, 0xc) sendmsg$kcm(r0, &(0x7f00000006c0)={&(0x7f0000000540)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @remote}, 0x0, 0x0, 0x4, 0x3}}, 0x80, &(0x7f0000000680)=[{&(0x7f00000005c0)="4cd576c630fdd33bd113e187589e95481c402e26b2dadcb448bdcd3c6aacc7d6644832cccfa7ee53703ccfc8a5a8c1667cda828f4a1bf6e08ec72b5dd495c5391897851c6431b69a", 0x48}, {&(0x7f0000000640)="f2e593459e20cf95f4dfc19affd7e51c846492ff0d1e52bbb8fbb2d592faab", 0x1f}], 0x2}, 0x20004000) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) recvmsg(r1, 0x0, 0x2000) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) r4 = gettid() perf_event_open(&(0x7f00000004c0)={0x7, 0x70, 0x8, 0x6, 0x8001, 0x8, 0x0, 0x3, 0x2000, 0x2, 0x9, 0x800000000, 0x2, 0x2, 0x4, 0x1cf, 0x4, 0x1, 0x0, 0x8, 0x3, 0x1, 0x6, 0x400, 0x81, 0xca7f, 0x7, 0xa0a5, 0xb5a3, 0x0, 0x2, 0x2, 0x3ff, 0xfffffffffffffffb, 0x10001, 0x9, 0x7, 0x401, 0x0, 0x1, 0x2, @perf_config_ext={0x1ff, 0x40}, 0x2000, 0xfffffffffffffff7, 0x2, 0x8, 0x27, 0x4, 0x80}, r4, 0x3, r1, 0x3) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) recvmsg$kcm(r1, &(0x7f000000bb80)={&(0x7f000000b900)=@xdp, 0x80, &(0x7f000000bb40)=[{&(0x7f000000b980)=""/156, 0x9c}, {&(0x7f000000ba40)=""/223, 0xdf}], 0x2}, 0x10100) sendmsg$kcm(r0, &(0x7f0000001b40)={&(0x7f0000000740)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @empty}, 0x1, 0x4, 0x3}}, 0x80, &(0x7f0000001ac0)=[{&(0x7f00000007c0)="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", 0x1000}, {&(0x7f00000017c0)="a5d6cd0dd76e5aef778cbf71c04a24e7d3719d5a66f2778dc85f6b1e23322b6d1bd4", 0x22}, {&(0x7f0000001800)="1652b544b177887e7b28fab0c417b11998690c7bb0218d2fa6b087512cfc86b969afe6c1fba5655f2c0a968377bc43b0f9354917370f6960673ef5f2559f712670844d9aed9b39294dfb771be2a59f30c731284c8a23e2b54de255cdf4c3119c28cf7915957070061f7372cdb77a016a0432372ffd8d1ed0ef19bc3def66a0e203770ed2ab8144ce0e9d6cca57ae1be30e5ec60e8628f5bd6fba6020ec75dfe00e2e1d4fcd1a7de2aa5b63e6df6fa86a4af1e1e117fc29d7eb0a987bb605dbfe652b8d5efb5fa873b10a6d95c6e5b6b5b0d19aa702bd9fa632328b7d13eda41c3346541449c26efd7a28ff3675a5c1", 0xef}, {&(0x7f0000001900)="812559edd4d65f0935356bea1414cd5a6a1a502b3dcd2e1d8dbb4723905f463f26ca2fe6c049cbd798a9bc02794e3d20caba904ec521201d029eada5fa8e442488b128d101c26c058a5d6214cbd0dfe37e6c1942ff688ab0ef6c7510", 0x5c}, {&(0x7f0000001980)="8996c4aedbe12983f0f58922572774b1dce6f51b5b749899489d1c9998ec6c3f5a99e0fe24788754eac5fc184e8eccd6700db74aa4d9f6ed4ac034f4a30ca69103260148e1fbb10b6e615db8df666cebfb96fc9fa7b84131f0adff60ca59402c17ee31da0831f0d4626e1dc7d2bad33a99bb44021f", 0x75}, {&(0x7f0000001a00)="a0c3863e43bd96c3e7317b696492411c63a8666d23605db03be0763db59769df0169cdfb1763093584cf8b706b0748ca56ec730b037f9149df8d505d6eb496f9f5d277ee60ea5aacf2902d80d99d1c5f0289f55579330044b57955be68cacdd22a75c1a385cfb212b8f70567710f4fb843c3d96bba7d68e8349b15719a924be754d9fcfabd", 0x85}], 0x6}, 0x20000001) r5 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r5, 0x0, 0x0) 22:55:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0xb) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0xffffffffffffff53, 0x4) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) 22:55:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) sendto$inet(r1, &(0x7f0000000100)="cde0384c2a6c62cc7594a8e97c3e76aa9a661fb3d5a097a5a59a143a65f5e202d4bcc41ecb609c78b590b4fcb3f09b6d649bc428944f05fe0275e5fcdeb57f00f85c872a5d5e8bad99f67108c254a64fa31e72d365996dca6092fe7ee92fc118c91a5d407b42c18421431eddfc50c76ff38b3a5c464924a85842d278f6dfc8012620aef25f84a3b9507c563ecca5085c6d16c866bb2cd6af24f4c6e5643c7fca964bfda2518ebb5e5ef036e6a395de986e6fbc42df5ab2192b4e4add2ed73308af78a8ee6b44a26c243263aa9ab30fcda157cf857240e0474461de", 0xdb, 0x8800, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x80101, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) getresgid(&(0x7f0000000380), &(0x7f00000003c0)=0x0, &(0x7f0000000400)) r5 = getuid() fstat(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getuid() mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x80000, &(0x7f00000004c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x5000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x81}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x8}}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}], [{@uid_eq={'uid', 0x3d, r5}}, {@dont_measure='dont_measure'}, {@subj_type={'subj_type', 0x3d, '/dev/uinput\x00'}}, {@dont_appraise='dont_appraise'}, {@pcr={'pcr', 0x3d, 0x1b}}, {@pcr={'pcr', 0x3d, 0x1c}}, {@euid_gt={'euid>', r6}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@euid_lt={'euid<', r7}}]}}) 22:55:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000), 0x43578cf5) tkill(0x0, 0x9) 22:55:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000000, 0x400000004, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x9e) 22:55:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:24 executing program 3: r0 = socket$kcm(0x29, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={0x0, 0x0, 0xffffffffffffffff}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) unlink(&(0x7f0000000700)='./file0\x00') write$cgroup_subtree(r1, &(0x7f0000001b80)={[{0x2f, 'rdma'}, {0x2b, 'pids'}]}, 0xc) sendmsg$kcm(r0, &(0x7f00000006c0)={&(0x7f0000000540)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @remote}, 0x0, 0x0, 0x4, 0x3}}, 0x80, &(0x7f0000000680)=[{&(0x7f00000005c0)="4cd576c630fdd33bd113e187589e95481c402e26b2dadcb448bdcd3c6aacc7d6644832cccfa7ee53703ccfc8a5a8c1667cda828f4a1bf6e08ec72b5dd495c5391897851c6431b69a", 0x48}, {&(0x7f0000000640)="f2e593459e20cf95f4dfc19affd7e51c846492ff0d1e52bbb8fbb2d592faab", 0x1f}], 0x2}, 0x20004000) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) recvmsg(r1, 0x0, 0x2000) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) r4 = gettid() perf_event_open(&(0x7f00000004c0)={0x7, 0x70, 0x8, 0x6, 0x8001, 0x8, 0x0, 0x3, 0x2000, 0x2, 0x9, 0x800000000, 0x2, 0x2, 0x4, 0x1cf, 0x4, 0x1, 0x0, 0x8, 0x3, 0x1, 0x6, 0x400, 0x81, 0xca7f, 0x7, 0xa0a5, 0xb5a3, 0x0, 0x2, 0x2, 0x3ff, 0xfffffffffffffffb, 0x10001, 0x9, 0x7, 0x401, 0x0, 0x1, 0x2, @perf_config_ext={0x1ff, 0x40}, 0x2000, 0xfffffffffffffff7, 0x2, 0x8, 0x27, 0x4, 0x80}, r4, 0x3, r1, 0x3) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) recvmsg$kcm(r1, &(0x7f000000bb80)={&(0x7f000000b900)=@xdp, 0x80, &(0x7f000000bb40)=[{&(0x7f000000b980)=""/156, 0x9c}, {&(0x7f000000ba40)=""/223, 0xdf}], 0x2}, 0x10100) sendmsg$kcm(r0, &(0x7f0000001b40)={&(0x7f0000000740)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @empty}, 0x1, 0x4, 0x3}}, 0x80, &(0x7f0000001ac0)=[{&(0x7f00000007c0)="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", 0x1000}, {&(0x7f00000017c0)="a5d6cd0dd76e5aef778cbf71c04a24e7d3719d5a66f2778dc85f6b1e23322b6d1bd4", 0x22}, {&(0x7f0000001800)="1652b544b177887e7b28fab0c417b11998690c7bb0218d2fa6b087512cfc86b969afe6c1fba5655f2c0a968377bc43b0f9354917370f6960673ef5f2559f712670844d9aed9b39294dfb771be2a59f30c731284c8a23e2b54de255cdf4c3119c28cf7915957070061f7372cdb77a016a0432372ffd8d1ed0ef19bc3def66a0e203770ed2ab8144ce0e9d6cca57ae1be30e5ec60e8628f5bd6fba6020ec75dfe00e2e1d4fcd1a7de2aa5b63e6df6fa86a4af1e1e117fc29d7eb0a987bb605dbfe652b8d5efb5fa873b10a6d95c6e5b6b5b0d19aa702bd9fa632328b7d13eda41c3346541449c26efd7a28ff3675a5c1", 0xef}, {&(0x7f0000001900)="812559edd4d65f0935356bea1414cd5a6a1a502b3dcd2e1d8dbb4723905f463f26ca2fe6c049cbd798a9bc02794e3d20caba904ec521201d029eada5fa8e442488b128d101c26c058a5d6214cbd0dfe37e6c1942ff688ab0ef6c7510", 0x5c}, {&(0x7f0000001980)="8996c4aedbe12983f0f58922572774b1dce6f51b5b749899489d1c9998ec6c3f5a99e0fe24788754eac5fc184e8eccd6700db74aa4d9f6ed4ac034f4a30ca69103260148e1fbb10b6e615db8df666cebfb96fc9fa7b84131f0adff60ca59402c17ee31da0831f0d4626e1dc7d2bad33a99bb44021f", 0x75}, {&(0x7f0000001a00)="a0c3863e43bd96c3e7317b696492411c63a8666d23605db03be0763db59769df0169cdfb1763093584cf8b706b0748ca56ec730b037f9149df8d505d6eb496f9f5d277ee60ea5aacf2902d80d99d1c5f0289f55579330044b57955be68cacdd22a75c1a385cfb212b8f70567710f4fb843c3d96bba7d68e8349b15719a924be754d9fcfabd", 0x85}], 0x6}, 0x20000001) r5 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r5, 0x0, 0x0) [ 3037.113233][T10699] device bridge_slave_1 left promiscuous mode [ 3037.119618][T10699] bridge0: port 2(bridge_slave_1) entered disabled state [ 3037.163730][T10699] device bridge_slave_0 left promiscuous mode [ 3037.170025][T10699] bridge0: port 1(bridge_slave_0) entered disabled state [ 3037.912809][T10699] device hsr_slave_0 left promiscuous mode [ 3037.962378][T10699] device hsr_slave_1 left promiscuous mode [ 3038.026623][T10699] team0 (unregistering): Port device team_slave_1 removed [ 3038.037277][T10699] team0 (unregistering): Port device team_slave_0 removed [ 3038.046706][T10699] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3038.106168][T10699] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3038.170494][T10699] bond0 (unregistering): Released all slaves [ 3038.288478][T29338] IPVS: ftp: loaded support on port[0] = 21 [ 3038.334189][T29338] chnl_net:caif_netlink_parms(): no params data found [ 3038.360497][T29338] bridge0: port 1(bridge_slave_0) entered blocking state [ 3038.367776][T29338] bridge0: port 1(bridge_slave_0) entered disabled state [ 3038.375370][T29338] device bridge_slave_0 entered promiscuous mode [ 3038.382678][T29338] bridge0: port 2(bridge_slave_1) entered blocking state [ 3038.390447][T29338] bridge0: port 2(bridge_slave_1) entered disabled state [ 3038.398244][T29338] device bridge_slave_1 entered promiscuous mode [ 3038.413114][T29338] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3038.423513][T29338] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3038.440906][T29338] team0: Port device team_slave_0 added [ 3038.447802][T29338] team0: Port device team_slave_1 added [ 3038.504651][T29338] device hsr_slave_0 entered promiscuous mode [ 3038.542626][T29338] device hsr_slave_1 entered promiscuous mode [ 3038.612440][T29338] debugfs: Directory 'hsr0' with parent '/' already present! [ 3038.669196][T29338] bridge0: port 2(bridge_slave_1) entered blocking state [ 3038.676318][T29338] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3038.683652][T29338] bridge0: port 1(bridge_slave_0) entered blocking state [ 3038.690704][T29338] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3038.733845][T29338] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3038.748402][T10691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3038.756825][T10691] bridge0: port 1(bridge_slave_0) entered disabled state [ 3038.767934][T10691] bridge0: port 2(bridge_slave_1) entered disabled state [ 3038.779549][T29338] 8021q: adding VLAN 0 to HW filter on device team0 [ 3038.791345][T10691] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3038.800066][T10691] bridge0: port 1(bridge_slave_0) entered blocking state [ 3038.807141][T10691] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3038.836184][T10691] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3038.845181][T10691] bridge0: port 2(bridge_slave_1) entered blocking state [ 3038.852222][T10691] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3038.865551][T10691] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3038.875877][T10691] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3038.885310][T10691] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3038.899072][T29338] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3038.911680][T29338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3038.923684][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3038.931702][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3038.951755][T29338] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3039.100445][T29347] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3039.113396][T29347] CPU: 0 PID: 29347 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3039.121400][T29347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3039.131452][T29347] Call Trace: [ 3039.134756][T29347] dump_stack+0x1d8/0x2f8 [ 3039.139109][T29347] dump_header+0xd8/0x960 [ 3039.143456][T29347] oom_kill_process+0xcd/0x350 [ 3039.148212][T29347] out_of_memory+0x5c8/0x880 [ 3039.152806][T29347] memory_max_write+0x4ba/0x600 [ 3039.157646][T29347] ? memory_max_show+0xa0/0xa0 [ 3039.162405][T29347] cgroup_file_write+0x223/0x5f0 [ 3039.167335][T29347] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3039.172459][T29347] kernfs_fop_write+0x3e4/0x4f0 [ 3039.177314][T29347] ? kernfs_fop_read+0x580/0x580 [ 3039.182226][T29347] __vfs_write+0xb8/0x740 [ 3039.186533][T29347] ? check_preemption_disabled+0x47/0x2a0 [ 3039.192230][T29347] ? __sb_start_write+0x403/0x4c0 [ 3039.197228][T29347] vfs_write+0x275/0x590 [ 3039.201446][T29347] ksys_write+0x117/0x220 [ 3039.205752][T29347] __x64_sys_write+0x7b/0x90 [ 3039.210331][T29347] do_syscall_64+0xfe/0x140 [ 3039.214811][T29347] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3039.220675][T29347] RIP: 0033:0x459829 [ 3039.224560][T29347] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3039.244149][T29347] RSP: 002b:00007f08601d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3039.252538][T29347] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 3039.260487][T29347] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 3039.268433][T29347] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 3039.276382][T29347] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08601d36d4 [ 3039.284329][T29347] R13: 00000000004c98fc R14: 00000000004e0ea8 R15: 00000000ffffffff [ 3039.294088][T29347] memory: usage 5464kB, limit 0kB, failcnt 3119898 [ 3039.300677][T29347] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3039.307902][T29347] Memory cgroup stats for /syz2: [ 3039.307974][T29347] anon 4317184 [ 3039.307974][T29347] file 143360 [ 3039.307974][T29347] kernel_stack 65536 [ 3039.307974][T29347] slab 987136 [ 3039.307974][T29347] sock 0 [ 3039.307974][T29347] shmem 0 [ 3039.307974][T29347] file_mapped 0 [ 3039.307974][T29347] file_dirty 0 [ 3039.307974][T29347] file_writeback 0 [ 3039.307974][T29347] anon_thp 4194304 [ 3039.307974][T29347] inactive_anon 0 [ 3039.307974][T29347] active_anon 4317184 [ 3039.307974][T29347] inactive_file 0 [ 3039.307974][T29347] active_file 0 [ 3039.307974][T29347] unevictable 0 [ 3039.307974][T29347] slab_reclaimable 270336 [ 3039.307974][T29347] slab_unreclaimable 716800 [ 3039.307974][T29347] pgfault 208890 [ 3039.307974][T29347] pgmajfault 0 [ 3039.307974][T29347] workingset_refault 0 [ 3039.307974][T29347] workingset_activate 0 [ 3039.307974][T29347] workingset_nodereclaim 0 [ 3039.307974][T29347] pgrefill 0 [ 3039.307974][T29347] pgscan 2083 [ 3039.307974][T29347] pgsteal 2083 [ 3039.307974][T29347] pgactivate 0 [ 3039.404020][T29347] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=29345,uid=0 [ 3039.420433][T29347] Memory cgroup out of memory: Killed process 29345 (syz-executor.2) total-vm:72712kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB 22:55:26 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:26 executing program 3: r0 = socket$kcm(0x29, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={0x0, 0x0, 0xffffffffffffffff}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) unlink(&(0x7f0000000700)='./file0\x00') write$cgroup_subtree(r1, &(0x7f0000001b80)={[{0x2f, 'rdma'}, {0x2b, 'pids'}]}, 0xc) sendmsg$kcm(r0, &(0x7f00000006c0)={&(0x7f0000000540)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @remote}, 0x0, 0x0, 0x4, 0x3}}, 0x80, &(0x7f0000000680)=[{&(0x7f00000005c0)="4cd576c630fdd33bd113e187589e95481c402e26b2dadcb448bdcd3c6aacc7d6644832cccfa7ee53703ccfc8a5a8c1667cda828f4a1bf6e08ec72b5dd495c5391897851c6431b69a", 0x48}, {&(0x7f0000000640)="f2e593459e20cf95f4dfc19affd7e51c846492ff0d1e52bbb8fbb2d592faab", 0x1f}], 0x2}, 0x20004000) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) recvmsg(r1, 0x0, 0x2000) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) r4 = gettid() perf_event_open(&(0x7f00000004c0)={0x7, 0x70, 0x8, 0x6, 0x8001, 0x8, 0x0, 0x3, 0x2000, 0x2, 0x9, 0x800000000, 0x2, 0x2, 0x4, 0x1cf, 0x4, 0x1, 0x0, 0x8, 0x3, 0x1, 0x6, 0x400, 0x81, 0xca7f, 0x7, 0xa0a5, 0xb5a3, 0x0, 0x2, 0x2, 0x3ff, 0xfffffffffffffffb, 0x10001, 0x9, 0x7, 0x401, 0x0, 0x1, 0x2, @perf_config_ext={0x1ff, 0x40}, 0x2000, 0xfffffffffffffff7, 0x2, 0x8, 0x27, 0x4, 0x80}, r4, 0x3, r1, 0x3) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) recvmsg$kcm(r1, &(0x7f000000bb80)={&(0x7f000000b900)=@xdp, 0x80, &(0x7f000000bb40)=[{&(0x7f000000b980)=""/156, 0x9c}, {&(0x7f000000ba40)=""/223, 0xdf}], 0x2}, 0x10100) sendmsg$kcm(r0, &(0x7f0000001b40)={&(0x7f0000000740)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @empty}, 0x1, 0x4, 0x3}}, 0x80, &(0x7f0000001ac0)=[{&(0x7f00000007c0)="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", 0x1000}, {&(0x7f00000017c0)="a5d6cd0dd76e5aef778cbf71c04a24e7d3719d5a66f2778dc85f6b1e23322b6d1bd4", 0x22}, {&(0x7f0000001800)="1652b544b177887e7b28fab0c417b11998690c7bb0218d2fa6b087512cfc86b969afe6c1fba5655f2c0a968377bc43b0f9354917370f6960673ef5f2559f712670844d9aed9b39294dfb771be2a59f30c731284c8a23e2b54de255cdf4c3119c28cf7915957070061f7372cdb77a016a0432372ffd8d1ed0ef19bc3def66a0e203770ed2ab8144ce0e9d6cca57ae1be30e5ec60e8628f5bd6fba6020ec75dfe00e2e1d4fcd1a7de2aa5b63e6df6fa86a4af1e1e117fc29d7eb0a987bb605dbfe652b8d5efb5fa873b10a6d95c6e5b6b5b0d19aa702bd9fa632328b7d13eda41c3346541449c26efd7a28ff3675a5c1", 0xef}, {&(0x7f0000001900)="812559edd4d65f0935356bea1414cd5a6a1a502b3dcd2e1d8dbb4723905f463f26ca2fe6c049cbd798a9bc02794e3d20caba904ec521201d029eada5fa8e442488b128d101c26c058a5d6214cbd0dfe37e6c1942ff688ab0ef6c7510", 0x5c}, {&(0x7f0000001980)="8996c4aedbe12983f0f58922572774b1dce6f51b5b749899489d1c9998ec6c3f5a99e0fe24788754eac5fc184e8eccd6700db74aa4d9f6ed4ac034f4a30ca69103260148e1fbb10b6e615db8df666cebfb96fc9fa7b84131f0adff60ca59402c17ee31da0831f0d4626e1dc7d2bad33a99bb44021f", 0x75}, {&(0x7f0000001a00)="a0c3863e43bd96c3e7317b696492411c63a8666d23605db03be0763db59769df0169cdfb1763093584cf8b706b0748ca56ec730b037f9149df8d505d6eb496f9f5d277ee60ea5aacf2902d80d99d1c5f0289f55579330044b57955be68cacdd22a75c1a385cfb212b8f70567710f4fb843c3d96bba7d68e8349b15719a924be754d9fcfabd", 0x85}], 0x6}, 0x20000001) r5 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r5, 0x0, 0x0) 22:55:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x1, @broadcast}, 0xb6a9a21f) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) 22:55:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x0) [ 3039.453271][ T1058] oom_reaper: reaped process 29345 (syz-executor.2), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB [ 3039.478943][T29338] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 3039.522453][T29338] CPU: 0 PID: 29338 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3039.530448][T29338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3039.540496][T29338] Call Trace: [ 3039.543784][T29338] dump_stack+0x1d8/0x2f8 [ 3039.548137][T29338] dump_header+0xd8/0x960 [ 3039.548164][T29338] oom_kill_process+0xcd/0x350 [ 3039.548190][T29338] out_of_memory+0x5c8/0x880 [ 3039.561847][T29338] try_charge+0x125a/0x1910 [ 3039.566426][T29338] mem_cgroup_try_charge+0x20c/0x680 [ 3039.571706][T29338] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3039.577327][T29338] wp_page_copy+0x35c/0x1980 [ 3039.581898][T29338] ? trace_lock_release+0x135/0x1a0 [ 3039.587080][T29338] ? do_wp_page+0x27f/0x1cc0 [ 3039.591652][T29338] ? __kasan_check_read+0x11/0x20 [ 3039.596659][T29338] ? do_raw_spin_unlock+0x49/0x260 [ 3039.601754][T29338] do_wp_page+0x5e5/0x1cc0 [ 3039.606154][T29338] ? __kasan_check_write+0x14/0x20 [ 3039.611253][T29338] handle_mm_fault+0x2adf/0x6010 [ 3039.616197][T29338] do_user_addr_fault+0x589/0xaf0 [ 3039.621233][T29338] __do_page_fault+0xd3/0x1f0 [ 3039.625900][T29338] do_page_fault+0x99/0xb0 [ 3039.630301][T29338] page_fault+0x39/0x40 [ 3039.634436][T29338] RIP: 0033:0x430906 [ 3039.638316][T29338] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 5c 46 64 00 85 c0 0f 84 [ 3039.657900][T29338] RSP: 002b:00007ffe0e1ee690 EFLAGS: 00010206 [ 3039.663944][T29338] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 22:55:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) [ 3039.671897][T29338] RDX: 000055555575b930 RSI: 0000555555763970 RDI: 0000000000000003 [ 3039.679855][T29338] RBP: 0000000000008041 R08: 0000000000000001 R09: 000055555575a940 [ 3039.687834][T29338] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 3039.696132][T29338] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 22:55:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) ioctl$NBD_CLEAR_QUE(r1, 0xab05) 22:55:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) [ 3039.877767][T29338] memory: usage 1032kB, limit 0kB, failcnt 3119906 [ 3039.896514][T29338] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3039.916128][T29338] Memory cgroup stats for /syz2: [ 3039.916205][T29338] anon 65536 [ 3039.916205][T29338] file 143360 [ 3039.916205][T29338] kernel_stack 0 [ 3039.916205][T29338] slab 987136 [ 3039.916205][T29338] sock 0 [ 3039.916205][T29338] shmem 0 [ 3039.916205][T29338] file_mapped 0 [ 3039.916205][T29338] file_dirty 0 [ 3039.916205][T29338] file_writeback 0 [ 3039.916205][T29338] anon_thp 0 [ 3039.916205][T29338] inactive_anon 0 [ 3039.916205][T29338] active_anon 65536 [ 3039.916205][T29338] inactive_file 0 [ 3039.916205][T29338] active_file 0 [ 3039.916205][T29338] unevictable 0 [ 3039.916205][T29338] slab_reclaimable 270336 [ 3039.916205][T29338] slab_unreclaimable 716800 [ 3039.916205][T29338] pgfault 208890 [ 3039.916205][T29338] pgmajfault 0 [ 3039.916205][T29338] workingset_refault 0 [ 3039.916205][T29338] workingset_activate 0 [ 3039.916205][T29338] workingset_nodereclaim 0 [ 3039.916205][T29338] pgrefill 0 [ 3039.916205][T29338] pgscan 2083 [ 3039.916205][T29338] pgsteal 2083 [ 3039.916205][T29338] pgactivate 0 [ 3040.045443][T29338] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=29338,uid=0 [ 3040.079877][T29338] Memory cgroup out of memory: Killed process 29338 (syz-executor.2) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 3040.095256][ T1058] oom_reaper: reaped process 29338 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 22:55:27 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x4e21, @multicast2}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c0500000000000000a4a088ba5944fdc0a076428cc23a6ff10164100511660100000038000000000000000900"], 0x9e) 22:55:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:27 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) 22:55:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x0) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x0) 22:55:27 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth0\x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) 22:55:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x0) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x0) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000009400)={'team0\x00', 0x0}) getsockname$tipc(r1, &(0x7f00000018c0)=@id, &(0x7f0000001900)=0x10) sendmmsg$inet6(r1, &(0x7f0000009a80)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x8, @mcast1, 0x100000000}, 0x1c, &(0x7f0000000240)=[{&(0x7f0000000040)="897e83fd76112830a34ba8f33b9c8245d09ebdd4ab639603b0b2382e756d3993add5d43cf3e1aa14b1bd974905", 0x2d}, {&(0x7f0000000100)="1144b86bc49208c05432bb728bb30bf1b962cc3b983561cb68090d9070e3fb61dab2038e929279e770662be4b058c8a8fec791abdd77ce5b13f6defaf1b001bf0f8c9839c541177397972fa65a67e8", 0x4f}, {&(0x7f0000000180)="f92b33777cbea72fee3b2507a3cd2d4375ebc4acb282cd403e4c460e55a15173acf8559fc956204fbbab3a82acf3ccc9190dcfa69ab5f2053c4c1762f6034e11804d", 0x42}], 0x3, &(0x7f0000000280)=[@tclass={{0x14, 0x29, 0x43, 0xe34}}, @hoplimit={{0x14, 0x29, 0x34, 0x2}}], 0x30}}, {{&(0x7f00000002c0)={0xa, 0x4e22, 0x1ff, @rand_addr="2889498099293bcf1fb77cc67f7af6d2", 0x401}, 0x1c, &(0x7f0000001600)=[{&(0x7f0000000300)="f3f617dfa7d98bdbf097176b1132fc65b55e4cf0ead9f5ae9e3cf17a5b0a647fdfcbd058d89493b9a489d97d18c3eedf752e7e3f2ebeadb19920d59a81841684cdbfca4ab72c7a0c86a139ebe66133ff4f698e7ad6b8", 0x56}, {&(0x7f0000000380)="5f9877fbcf312f50ab0587456237d80de3cc151131", 0x15}, {&(0x7f00000003c0)="daa49aafb9ece69d67b9e2fa290cadb011e406bb607dc638933b059edc5f877ff7a9482b80ab5797e933b726ce7c91ebcc39041f75a1421d6fd1a7196e7824b5f6217b274433ea7b94d7d878523ee2012163c85b3b22c82c0e7bc9b75f852104b94ef525fea71fd4b71884298d6c6e4b3a39576a36f76d77ecb09225424a2652b01eac8b6de3e28d7e5ac9b211ac7ab636702a16de413e111cbe45a990f7f0482f849e1a10bf9aba7c14dfee841f1950804e88b91c74c1187c17", 0xba}, {&(0x7f0000000480)="eb19850b79f71cef593ca2485844944a06ca4098bce5b4557396009fd2ca629d9ad5bbafdb2e876f2c394700e1667564e430766192bf1e21616210b1e2dd489a8c05dab3420938f79b664d7a1c5fc3e705c4f09c85b94b6d5136ebb47308f43fe17771431aa45aed1cf051ec9f2dbe00a89a20b45974b1348d3bc77ae49592d9d20a247d45217486a085f375387aa5e10024022cc47c8f1e222ddb2c9596e705eb78a74238d65ff36ac82293f6d935f959b0547c360c9c55ece345dc5be6b26d025833f8edbc25ab7544b3854152e399ee437cf27975cdda288f1d0f2b4e967b2ab9495dd0261d1b1b8d567412c294", 0xef}, {&(0x7f0000000580)="8d58bf4ad06715dc882004d309b726a9dff3d46b98d15ac42f1d9289a560b3cbec8df65e1fa538d9d6cb8427634bc7cc49ba8f8e79e33fa63f1143ccadcff48dcbd28f83", 0x44}, {&(0x7f0000000600)="1dd05f6bf39971ca9a8fc2527c9814d0ff9e012b3de8ac1a6cd0ab0c1a9dcbb03fef27f83522b2c77bf36edbb377f91eea57c14ef48d0bc3ae363c8dd1d1d4faa2918ad8858ef100f704ae2e2f2d1f09a39a60f2e064c30823b62a058a84ac5eae69bf8b4aab2dddbbfea7c673367c04c095950e90bff4b29b8a8b49f337dcb9a35c5d9895b59481d8a8fec5618c47ac84cd789482b42effed246dfc0d31c7ed92b3852c5bc15cbea3399d6da1ba00c4a423f4e8a3a1d45d2cdbac252c623fe3479bd23eca2119dc16fedb4de4487887ea93a0a42e60762572e4184a3ea18f3fd1b0e0b0b8cbf086067b0b3a81cb0388c658309436390fc67d02bae5a56dbb2251c2fe57ed5da5c03cbd4f71aa94c6ac059ae53e5a77b98b1a1ade4b0c990dd6e87bb66de62cd3c69f774aa22809f6075288486b8d7f297c0713af549009eb8f1f8a2a8cb09227e07e5e126b1440fe0e42a273f14de973227659966d4d518e8119547c3e3b7bf0c8e3d7f8333d811f12ac29861e4f32b0f1ce57836012e088b3f075099d02cfa06c24dea430a3e153cc0b90fb8a57965d2fa18c017376961a8274ffb20d265b8739236b6a8e7193d24ce008ecffd13cc180c0d0fe19fdbfdd2da0d0b98bd0a88c4d056f1482851fcd0806da92ab73c37bca309335e7ea3a355cccc7ee87579c63ce596ad2d46fe916d4f356f1339451ba3403f8f580075bf492a5d5837f2ab264c90fdbd3e002c1884879c5d5c0eba86ee94e957c9a4211a9a334259fb848119e636a0def49e3ddf4d105060d401347e09fb32d6ea8c2ce42d0de1e0d70ced846f6c5c2a23ece744992cf31cef6398087b4ac51ed9572268b1bdea10e668bbeb30db139ab130661218d201b80b927e7955d998ee312d009325f02d321bb4101f92be43d3337d80bff730ab1c3fe2b0d924fa2616b750178dcf55e956981194996553350bb30a096a0bd1dd5f29272e963aaf04d71f4131df280b69f9436aaff1a7c7e6797725079c49dc335df494ac45b28d791b807b961d8706563732760084553722e58977431e7ba29455b713c869b50f3c767df0636d6a98878834df4f00f5e6da065963a072099b69abe2620ff1090a4bc00004242a5cfe44c049fe2058485e829e261e2ba989436d5cace19be37104883582deb731dc581e6b7c60c03cee61bbe67ef74c55608280eb244a9de9fc4f980a748ac89979a54cd88bb53df40c372fbc2972a39d390b5c4e068de444ace288f84b8ac14370a09d78867e6fbae35d4e4310c1cc71184e84a3eaf3a6a7d013f9491c340c39b1ffd353d749152ee11adb5cc80b600861e98d287b66a8c6c0cafc9be09812f18ba1299132d0e63b24681e881af76322f9eaa3cbde4685bf1e8d402c7a953d82cb512cdd3e218eb3080077bc15ce90d2ee40160eecbbdbe37e7e073a2cf2d8eb45bb9db5381ccc3bfbebc5d55d873d883b6b27478558ab570d02e6bb962561834c1696f258ecfac4c16ffb83e851f0f4babaa76f777635ecfb5181d11cd9b1816655b255d216a7c8c907a1a58c8160147101c73194b18c637d1de103f6e4b6958fbddac8dddf70da7ae9fcc60aa0935d21060298e7464c2c88f59ee9504a9d3dc08b5547c287a7ca8b4dc17d96895a1e53d1017179caec69a6163438cf3da5e98efa2f5ba0d88816143c3e2d3603789566a50cb2b77f418079a629b4b3fa7411b65c0a73812751e991d455addc56aa2bc39d593533b15a4c04cd564fb52b8a8913172ccf7ffe56287d62507399fb4524b3766d6cbfeefaa3bd3e273f1c3d4c5028d796ae1081454146a379ba34266ce4cd131ac6ec56b306db00c2d5269f56559395647aa2354a432ef37c6de0adc1bb5f8f649b870522bd524a7b8c0f8e7f880b00f1e9e5880a8b141e471b485ff82d33faab69699a705cd7f57e2fa5efeecabcf899fc00d3b2825a57144a77a756c020e969cd3aedd079d4b6aa0cda3ecae05b75d64c97179e847b1b83c4f78bf416813de802295e6b18cf0383444c4dbb3666624c7dd239f7cacb520ca3200b93066c1fe553a63ec27455ac36a2a7feacf24aa38d9877f5735dc7995253375787ad1d129a0101657bfedc2adc9128ad9a2adc6105efa3a36c4d995300671171ac92d797cb17b326a6363c66ab7cb7a634f72496ca44b5c50ddbce889aff3a7c35be49b5f01214c948060c334f5a424717e885f6b44d97c281e76ee988edcc89b25040476142b137f458d06f1ff6f31e308d0c8c5ca2bd05c82abdca06814a90516dc8211fdea5c17b78f91b48640e214b3de8c1bfd38635c67c489ddadba6d3782a35e4402f44ac3acf854112ba7fe92aa2d6c7dbc2aa25a2a1d9d04a926ecb33759af2e55dc2ccf489d60ceca09ea91d5a6c3393ba18d117342070b90fc5ac623c483da3d13f5ead74e8bc65f387e6a122c446d8c33317193d6e527241533b4bde084d4c74eeb421fc435672b2adc4955838726a5c88a92ff74c9d98732a82bbee0bddd28faa800d1263cd8bdfa4c75b2b9cf6f36be03b3cba626a93e170304babac314981c3f7558781e84d4ee9ae8dfc0a4429814976b2e9ea61e11bb0fc72eb75ef2be80ee20e86b4c5394e095712d5776d06d131175061bb20e2b9f24842f40379f91c81b7b97568e4f912ce86f08a356ecf305feb02b21c72d58c8a6b061850f3889c2a393ca17d1b72f16b0d390bcfaa5ee2548eff59b301aef35831947a224b5362d7cce304ec555c4a20ee434e868ceccad5cd5818a82d18350086d6415507acfd44992dff39ae906effb4772f34d229a4b4e1e107dbfcf6ed9aeea6c20c3e0403a11390edf4086f4c701e2b9743de89e39c8d38ad17d71b7a4e91db1686108493baf3c1ff0adfd1d4b0d5c92250485bb4c9a25ad8646070abdb37cdc73b725a99aaa2af9256991d3bd02d22865f29c9c17737551d10d43b74a6715bab0e94452ae6b5759f04c70319b94b274f5c8bcecf9b6b2fa7d9b52c5abfa5f9ea6d3274c9f7d74d9cd866ad9a60374f678acdceaee19f93780df3d4238ef4354a302570e3f9a7f11ee56bcd27c3a2539c0f0541206eac20ab9b05f94f8b2d5d795320ed102a48e7cfc8d2f8921198ce91068eee10689ff7a0cee2d696ea724c1b6f966b929c51364133e08116664bc4cf1314eb23231b05768d048a374267eead0374f17e50ffb16648eeb766c6b5817d89e7f0ae3953b57ace3eaade17b393b69a292c5ca081171eaa0487ba236bfc475a19da9d64d227f26fb3dfa7811312015ff4298b1367274384da5408827c6a920e14359db0b3e00df4d8da60672bfb2ad39baeb875a933a8739396e9394bc9842d68f0ddd416bcb22c9d3a2dac7529332d2f0b795f987d83755584d1121ad186e1609e64f53491b0076c482dcaabd2eb98d44f92a6372715604b32bdd21ce04f8e59a6ca5abc81eb80d6777e24469dd97b2afd40127d22d560d44402969df2c4d65a022e278aba92f0ab9cfaea548cc21b0f9b7fc822055085b805a52deafc817a3ec6cb7daf0352b4196d1b817c5415b2aba1056c5fcc8291f005f5447b73ae576267560d50596467e7e21f985b3fb3b8ed5ac87b1c58a1c01a78cbbc5af21a4386f40219f8a9bf3bc2398830f9ad515ef7172f2692c151a10022df5bf84246e389a8de7cf47ef3407bb7fee7394e76c00227d6a141a1d41654155a8e82c34ef96d8f3b35be464b8f8f0de57b14625f94b20cbbc19605c7820e71fb036597897b88d3c51bba60e1f3f6016018efd21cf93c0a4917a4c6f8491498284aed3222156295c6c9fb5437f9abcfe93f2dc7fee3d3849d7fc04b86a283e030c95b95ea5539fa88bb42250c8a9d2f03b8807860075b240a05751793099e35fd2229cc178fd9ae7d1f5b9a135459eb949953253cb6fb12c0637ecdf8be814130bde508531b03cc1fb18cfb57889b4f812291f4c6df348291aee5201247608a03a856fc464296fdb36872cd1794a6b1534e087651b0af1980535049ddafcce8afc3f5c8c0663a2a4a3a3c195e563b4765473aa545cbe4f809de2e5ab7e1f7e28ea478a6d85ec0b0512a66cc6002c1222d0e22496d6815ba2fcc4cccf05007392141776bbc696f4f619de998758b61b5f30e1566e77da513e73c42fdf5cc57fe93ec7371e0213ec9bafcf7b2bbc123850f54460815cdb42b0b600da3c7db80850924f8a1f567d4a158b43c827823ecb18ca5f28ec31960b34a2138d5aa521f6e312e8a0759d0a5b0293e97251eff41cbf0a9050564ebdf6c54b43660fa5e9717bda189a2a3966db56d7ce55a4ecf360f65875bbe738e1853de8ce4526c2bdc9dd62f1566db20e162aa1c698810cdd46b745825191745de16b5e57dd342dfaa4bdf4e3a89e090776a973f56a2fdf71cd86a1c280b7b6c074f86aa06beab5e6c308be0bae8fcb8234b055a2792c2afd4078ae9e43c5fb5a9993b7d83188c8a8b8cde87f03c8ce46c17c428660c08b2898f7a2afec8bab3808e76045f3b3975ae3101fb506c5a61268390ebbb364e718446d5cd3aea41f249057b0c9edbd91fe67e03921784f1734cef60b9b6592356d975f01d874846a7649072fec9f4148695d7b4e24d7c0a5bed35df04921ac990538f771100970095daeec7ce058f7e33977a06edeb371ad781963650087e5a962e7046eb798886871afb353dc87c0cd2bf76c8c12d4603bd78a10f10b1e0ecf94ae0566697856e2644eb682f33fc81bef3d19d9e244ca8e0f45b26018f8127accb3ee532637730eba337de15fd5f618f384d964f148b268f3826f113a55e47369dfd532dd581c8313ac4e9fa8a49da3339d7bfe1d62a7ef6b36cf1ae3a9aad233bdecae70e51fd3c0dfc6b246243abc59b29536fe3bf2ef4edcac8b21dbd9174cd03884ca096283f692051cf366328365402fb5e64034912a2aa3fd1c90ede9a32138c35eb84ed173d7cabbd86a6a93a900ab7677943b1b5f6d62e5c873f7f763c98e5da5924f9af7fd472120287d7119ee77bea92e0c83f6f95dbcf80c14091c8a6ce4ce5f0f4cf029d0643f3d049eb2b27a54f8d7ee06b2873bf71b0409fe9843c2ccb4ff05f7460c2c237e65c330c578c0ee06df15603e66e29ff4442fbd37af47a92a39928785d491f5c7289efbec478e07ed5170dae9110b4c3704c1ea79eadd4e20d98094ed316a3e566018a13d4641c7884a0b2a993e4d153729b07be9eae3fe50aed705d0d69526f818d7a477f0b1d0560eee264a6952bc1d7603ab8ae05457b7b6f2b36447464df60c90c0da548e43335ad5e5b7a7e8a79520912fc4deeecdf8ac3c8f2abee27b2ea55895a27109b8c727879493ef19501b99f5932ba0a25a620340732447cda8d97c0b52db74e843636a396202300b02d5840f95b5874b4a6d4e4d30144daa27a9b59d1271fdc48e5d1e76441be6356bcad272723511b453c97d41644fbab627965c4c735c1492e6a374a4c4caa4fc75452bffc968bcead1f777e8730f2ae3c2f7eb286834d81d255c9be60ba1e939917cadd200e3f1b6459f75b9e18a9d64e8d3f7d1ece2e576ef238115581efd23755c652fad5043adab3fdf2d707950c0405400459fb802c4c5421a3de64a8337ad1e0a92a3586543d807ca1da95ac74bb291148ef6306345469f6a1ee535d45881a3db80f99faf866c9c4fdde8920646904b33c3c5cd3fdc0c2f9f9ca7c6fad8c525d9788b538f1f799ee6fa477459a25f7556564f46c1d7a19555f38e50d1d2ef83b393572214f8b34dc6ee30f5084cff68070775d6e43c328aa1df785b", 0x1000}], 0x6}}, {{&(0x7f0000001680)={0xa, 0x4e21, 0x8de, @mcast2, 0x2}, 0x1c, &(0x7f00000017c0)=[{&(0x7f00000016c0)="e70498a1d1b29f7f9a8e54af3cea713879f30f9bc111c51c9dc39c18b8e07b93ff04fadf6c6de7dcce0cf544", 0x2c}, {&(0x7f0000001700)="ec846ce8d634714d79cf814b84b25d45af1c8d7c6c68c5947fecddf66a30a5b12aee28785c644a21a2db2095f5261031b48b55406bd75befb58583bd7d4f00abeefed5a2c3bbdc78ffd5bd067febe66d312977a407ba661382b653fe07e10eb2651f20fe0b16a012afe1bb7cbe40e1760fb6a87a7726df1b7ebafcafadb0b03e2cbb07a46d7e5b21d1defd7eef7c055f76888c0c45b1c616bfd67802e0309a188e57880857d5971ec9fb13736dacb1572c0d22aca5d7ddb0e21ffa37cc", 0xbd}], 0x2, &(0x7f0000002e40)=ANY=[@ANYBLOB="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"], 0x1f8}}, {{0x0, 0x0, &(0x7f0000002dc0)=[{&(0x7f0000001a00)="fa0548af2ead54c67e5d2a6af2a1de2da3e12d265336bd7d96ecf495f3df931359aa7572bc15b4fa6e3d76f72b7047b550499a234fc2f4399d3ac470f270879f82ecfd5f91dd672bdcf18eaa068fdd32a1180c2f4fef4eb89ca6f33c7deb685b627455e9bca9cb69b5defce2ef8bbdc2f107dfe6adf0cd207e2ffbd26c5040f5db00d8f78184de3dddfa7d21394df49342d49cf662311ec79d28f8c5906fb44a5c8ce978e8ec5225e0e156d2d418863149408c7a8ac67bf33b6b2415de4ba86b220e59497a8c60ac8489f1a0fcaab49c49e59d4936bb28cafbec76da7477f4ea10147cbacafccefbf24b5d5473609171", 0xf0}, {&(0x7f0000001b00)="077fbf031f1b1f7d15421a7b9e0ac3c08c81e762d93f9a2d99610cb16cc59db89ec1fa7b67611f0b84bd91a50915852f62357f4d520d285913fc3496c22d65a5277679", 0x43}, {&(0x7f0000001b80)="b97e6a79c1d7f7c47da78bef76e2e06479", 0x11}, {&(0x7f0000001bc0)="713313f5227fe9a1913e2792a9cb77a9b89fc05bcd8cd57fe5aa6c9f3c54df2fd3588d64ec5a362c689e395e6185bacb602de9cf98ea3915520e1c08f8b83cb45aa83ecbc13551148bbef3abf20be6ee3b3b804931b8b5ea2b183e361c29942d3fe42acaa384d768d9a25b65bc52f7aa29d864988be7c2e197c2f49b0fd0944821c089241c84c787a5ba796d2805ffb219ddd291c5d0a888e2d996c611cf36df81a7c5cce48febb1cf0bd154462ff9d544334971f66858bc5c3b98cb2e1d982395ad32", 0xc3}, {&(0x7f0000001cc0)="76550fa2f0b76c292b9da52989e7622f9ce8dc1347e404c82eb4f56ddabf9f46f4f2fcf72b9f355906660c366f38f3608bf55fd7f7425e6bdcd0dbe06b90d842a74f6d3c80671daa5ca101612e193ed1ae97f557bd84bd14bd1987e543a189f3df0b3d62405994d247bec2e6b237da5f164be1620c77d559b12a13157e3369bb3afc098bac57cc69aaac3bfa2a2ac820c62e7bb69be53a9c1276cc6ddc98556107a439e3b4e52a59a67f959b469f208d408034425839629e428367ecc96c787194b3afb7412396e13de488179b89fd13054b65e29773eb493f4ca7ac1fa62dbb33d9a6a977bf", 0xe6}, {&(0x7f0000001dc0)="a694cb0451b55d78d804f4ecb3ab1904115b757c8afd71f21f374f7704f044fbe3cc01d040c9956003b6bb277aa90c26d65142726f84ab665711a60e335adf3da5a8df7dee3c5a11f0c0f7ea76fc8acc67f87dc0937cfbe04bf87ff317bf73aef64b79eb2e5064c48fb1467c1a95b70b68536d27ccd2dc93a9135db9dc9041d14fbe91fbc9d1eb285f588f7069b2a7ce7c54841417dd01d58fcb7174c6f63fd273020bdafbdbf5aab0deeaef26cae12c1ce04eef4caab2c2586ca24945b0b145cb158cc9aa252be1ec4ea683f03909887ad723ff33f957baa91e6ea1b9bf1c6aa2b151bb6256b187e7c2ccbf39dcd295978cc6e25dbe4e28910a598e897fd1387a8827f6515ee3a65ef1e5e093e85204a08abf96a8d68cc6517b6059a805a3c32eeabf0d0771c05389e22bea86d4848c1da45526ecc4901c06bd30294f7fa8bf3fb323d3373f2c334831a76c200391bebe4d6dab617e270be0fc924c30a6f65f109a41eeb7fbd5b73c87914a2234589743a47ee93714c7bad332a2fde844c054b192dd5489fb6ec56fbc5a41bda4bef5c7bc98509a0fc5dd2557832ea5c3b90edab3c4bd087869f73467c2b4d331d20fae546d9bb33e824418ed5e510dd127832e7d0e682d1d594ab8b02a2707596ecbcdb1592d529d04361e4e8fff17c380c84a61895ad99210a39b0b2ae5771371477eb82f84241e91ad90726f238ca3877fd091b7f1ab7e857da447a53ec826924704e865c04cb36687df41a5ca0bed8fd1993bd15eb735170cfa94d399bb4747262b1ab32b867906740341234f8167126914353fdf2300cadc81e954a41499bef566ecd3ca01f37206daf2a8672bf66437538951bf61bff6ff10d4e845f84aaa08ba8617cbec28eef5ee8bfe953b662f3c634575bfb3cc75ca718f591ca7f56a97a6f3044cd93561c6d615cb8e9c9ce2649ea639878df421b69e1c41fa2b2f8f20065873573a0358b4f0b45bd97447dfc95b283f9ceb180211f55e6a79e6c5dc90d69ca5da3a09b1025d156906b7492bbd895fac22ff3ec6638eadbef9b2be92fd1dcf76a138db679f6e0d80f0dbb6e6e44a89932b6019c8428c7a6295ee6ecfa3601f80039c5e40dde94791eaee7a6c5d5d90b20fe6779452d685c5960415750aa9bc3b04580eefc02b69368d59d8b2ead87cd616823800ed36cf015d2b54fda9f6db179c9e72295be7db77de24e6d2397d8ee32429e49ad1f7c0d33c4f7efb04c2121ff995ee85487b702e914a9b0dd9f27a931e3cad7b77d71a76846abff34de0b96c628443e87b87a2b9a99c4fb4aa4acac73c8c0669a9f77d82eb922e5ba0b10c529b05b40001b3306972a0218ea0bb48472a5210ba943b81ff7d0eccde236dd91277b0b3d2d644985c52bea7198e22b3f02ed5a8cf20bfb85726ab763ef27a22b04732c41cebba12dc64bc6bcd6db0e18d7e19a1d39c0731c15321aec69539b7244669e25de12febcc706615f1fe216f87ae21f6a8f88e136e98445d453a0eb7be05aceaaeb3a16685dc5a85ddc06b3317159668b28acc554eada0cb2030a20701fa3413e69160a5f28d00b2d4ce3badcdc31a23efcda38c194005b62ed621e24f2fd88f6c79139d8bde29df5094409370d62eacfb7fdd4e0aead992c238f3a6a61a9842217eb8fa6af8ec7c2908821f9990634e206a64dc46cd435b451b961e94c830fe0c439ca0e5aee2f665ae2902cbb35afcb411d69c7661bc4b294926d21334524105a9203a173ae43e084269e298c543267e44659db40348283fc0812700ca64376ea5368b46f3c38ddadd99b3a93d3c547bba07fc0d07934c8cd4c62338c8827156c350620b359a017722bd7953105e6bf4533f9965b33543a5c79ac64ac2b7d2f8060ef71a26e16f1acf99bbdabd43724e3d615f5f379bec82fa8fe1d450f1fe0720984d462a6487b06aba35336114fd55720cc33be0fbd05634eebcb16a215b01d915357708bb72148c66d3f235a76ce242ffd8338ff49fe9f9517b97c8e51e6d26e913db64c28c7c9ab5cabc28529830584dba58964cea261fe39abc37028caa0745dcbb6ab41594c3a97a43bdaccad0030370dc352cddfa28c049fb61a1e0452f82042dc1fdc9241bc3baf050e2ceb8dcc397be82f9d78be8fbd5441c092ba105e61e475053fcd3898a49648cd0cde06623b876d8211e2d8be9eb4faff23c562feb706ead2822ed471c0d4e8bd83c0692454fe019027924e4fccff004c3314238ec9cec235a4fd2c77b8bf5206a86f3b8be651ec59c206294f149020d825f5d084f3dc41ba3685932db1d60edf2c49a0f5259a168d82a1ce921de7b9c4472de855dd833a2f5edce77a3766ad260ca548fed84cdbb6500ac224324d89f1f552083a884b48d15d15f552d69902e3197a83a7b37c17c2fe2bd1fa2b6c5f03c382a90fd4047584820b862cdb15dd75bf25a4e945e1dc121e2ebb6a6f8a91b4d1844e3a08f4f06147c723bbb3120290e9c60227e8cef0753c00218c169d48993034c71d72d8fabff23df0d089565a86b299606e22dec8aab991769a81e11948bdd107d06086659cf87cc578eb59eaaaca64e2ccb61d22af9516b13193042a0ccdee527cc5d89c4570bbb8dc79595332a4275a7d6a0a0344c990f54ef7c555957d92c29430559e15377fdfb489b863e61fd1a65055c445868303d205614e5e25f4887eb725d8f3c694f4cda6275efd90838c61e1fc28b68e59bb4693ded3822a559d0628708aaaf2b80cf46dd1de11c116d9282e307bb4f7a97ccee3601b9812d39b84187c2622503df4c7754d518d9ed92aa3653382043289f54a61e7e1c7e325dcc6f830c67d833356e5289982e51882f5b43bbd41e43a5fe76c3b653fa05487bc3493659f1b194d05bb7e27d922721c35b9a2b2fc3db952542c3a8c5cd68341631dbe39e98a0a0405cc1e3ebdcbe5f5be114eee33d9336c9af8ca08916408af1d6d031f922cff41e6d2fce0a80246f85bba9be8bdf839be2f3b7630cb29e5fcc485cc61df1f4311f23999d5308262638404fe1badd7b008003e7e6984b787bb72d05d6730a6d7b5577592da49fbd1e65dbcd3b527691b58e3449aa537ab20b4a71b2ba0be5e6b7b76330f4330da3a998128ec8a6ce47cf8d15c08fe02b637b6f76e2bfa7235fb8d4caa70b97efab46c8480a9a282a3b5020c86e56cf725d4ccb17070e86da1630f716f81c88517d4887edb9f351c7ccd9e058b27662374ea6a8b203c7706233140453a32c47822b9df1b63f81f7d6209451effd6ea76ece5f4c5459da73880cfc4d870f75059c285b8e64c63a015fb9838bf602ba8d0629d7a33f82a33de95210a8046bbdc1b324dceb14555d20017690f7362f99a3931327bcf692d64d36dea77af0fc4cc8b41dc8f5d32a8ab3a89d8d4889ccb8aee8940437b547584813ac02ccd8919c8443f71fc9e4f867a89e04bfe66991896f456c9b048da72ac416ce9c701cfcde3f87a4f581f248535b3f3280c70b52ad4a8c647cd5c15694228721bfcd895d5c161e8c6196d57b3f04008b8ff5f421bcf0794ef4cdb3ba672964948b9dfa2be445a97b9512e937ca9aefc0b1e56054e555abf6d719e974c29d00f34da82636cf587f49bc392b950b83bfdccbe1f38aa5e6c9af6455323d01e31dd900e1c944d387815b610a82a892fbb6b1ab50f4a68e9184cf8627fde8d3a1d993eff2de809ae8de8f5832e7fa56c2808f50866cbbbeb8c6fba0a0344bae4ed29547ebaf19ad2bcab5d7835622c29a29cb04e93d98c11931e834fad1b6c9225448dde90a6cb7946d47f0e54ba32b96dc4a76b259791bb3c4cde9f69915f28a7893222d16389b0a94b5f156ad4b320948b1b190277f0890dde6713ddeb966444f7151a460a9a5b570b29cbd25a311729d88a2c2b56ff6a78f99448e9babef49727be1074f22c65cae97b4cf9aee0cdebb1922bfe6a57f5ef8b5c507c5a442af81a77814165587f3f8548eeaa8b21a90e5d0816269b616fabbfbb8321cea3d2fe378b09688ff2194910f77ac60cc662b1e6dfac9501f1446e4cd267911912f6d11e6a9c248112fdf0fcd5673e1f1399b6eb27347a454e3d13685370a36ae6ab8f69594a42a990241e364ec56dfb542846e66e637e91ec11bfa2a012bdd31954ba725198cf9b29e5e428c7799c10bb828dcd7d4d4ebc4fabebd44eb2f67efe115e8ecf37b1e173acfd7a1b8fe4bf636f301088a595cafdb2f1ebc71e8e9849868e8ef2ba28c7348bdada6dc4467686c0ee2ddb9da7018578d4a75ea52047dec241ea0557a5451f4399eaf62288702538d4e31624a98d8920cc84a9c4176c4b322ac578a3ebcc4e40603ed36b85018ff82e1026e8466c39f1357752a50403cd4a2b1a49e0ac0c5cd34871d918dae5bef3dbb726ea5b745f09ae385dc2b67c8f6cbbfaa0af4f43464bec17ae010b0db2c1e2dc3cc09162e66dad5e6e740e7a38f3a8ebb5b9a7e74ac621bf2bf63a042322a95c176872fcf7fcbf047b91e94e0995f5e6e48b07bbda642765b3484d36f2c4bfd52760e328744232dc8b3758194ad91bbcccab25486acd94d1577d229beb261a439735f37ddcf01ca7841ed49fa44088848f43a7209daa6e5f53fc70aac1fc234ecd9693b4e8d7aa6e2a0aefb318ac057c0c6c44728adc5d53a5a36f62f14c86f9553aef36f04b90788a5fc3e798dcc20705e788234e326c1baa14a8da9cefcd45ee8b1bec454c2ed752a1471b65d4ff333a6cf2d0c7810c6f4324ff351ae722a53675379b66c5cceccab2c399da561b89c79bdc77da19e329854771a74a6b1e4e269f09a74935c738782a5b4f28badc6a6d7e25e9e215e2e64d18ff30233740a0f1dc450946f685dd325db4ddd7115a34658ff86516411da68f41aebfb0cb8cd583798cf8f038a109dd4461502dc3e32a615be20616753f1843b9566ba2f1b442f146e073858e35f8520ae819477a9f738dd9df9391eb265b7cf20a28b7fb36f6f80de583325d4d1e7211df99ff8c6e74e79d31cd9accf061d7b61bab35967982c94b28841e66a09c069c226d744fcb4621171c62e3edc5ac086f1f2756c8ed5abc9bb275e6401e232a28ace2512b6ec0000742506810268cab9927cddc53f2cad0d17e8859ac385b04737cde076cd1280cebba56def0b0c30f5322f8c2bf3931ae71296598a6ae8cfdacb3ccd9753096f2126b57e7a974aa93fd2beb4756daf342a3ea5feb179d358b511cbc7a4e519a819de8a1dc8f685ee61d3363d1b2d8811eb0f4477ec4896b7935be2e1c6cc62d74d2ccc344dc505f0ad842241210a01ffb02bed863b3c3ad8c42238f5f5bdd79fc992e2b49a73d51ee8c0f0b4bf0c6b6ebf0d6d79050efa1fd663013cebde22b71ffb9bfe769b30056bf58d25ebf5195d5dab5a60fdd997ba93fcf56745153362dfe939351a347f81939380d839e93527c2484e952f09549cadcfec377df4d7c9e53bc5020449f722faad37eee847a3c66a3bc3b38128e40978b5c3079e1dfff371543f954a6ffddfe73d66e1a8e663652ec22baa26f794b12c33abbc594c63f2936a46797f4b24891967740bca6bb1f121dfea0941670c74beb0891b0369a05604574b1e0e786e06a8a963793acf3980fc9394f77a96c3311b9a71dc9fd3ca02ceb38de6161ee0eb2fadd08893abaeccc8e7a06090c04c87966277aeeee7b0d9e10fc90fe56aa10b67b7246c6affcdf5641926511cf847fbf9369e62c96253c36d465ed18ae076ee39c25e0df4b8375a4fef8b9f898639044c80f86a631e9b2e1c7d0dc2", 0x1000}], 0x6, &(0x7f0000007280)=[@dontfrag={{0x14, 0x29, 0x3e, 0x6}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2}}}, @hopopts={{0xb0, 0x29, 0x36, {0x3b, 0x12, [], [@calipso={0x7, 0x48, {0x7fff, 0x10, 0x2, 0x0, [0x967, 0x401, 0x2, 0x2, 0x4561f0fc, 0x2, 0x1000, 0x8]}}, @pad1, @calipso={0x7, 0x38, {0x8, 0xc, 0x7, 0x5, [0x8, 0x7, 0x3ff, 0x7f, 0x10000, 0x5]}}, @padn={0x1, 0x2, [0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x718}, @ra={0x5, 0x2, 0xcd}]}}}, @dstopts={{0xe8, 0x29, 0x37, {0x4, 0x19, [], [@pad1, @ra={0x5, 0x2, 0x20}, @generic={0xfffffffffffffff8, 0xba, "8f52733fd2b2be4a1921980a4a1ba324d9569084861c23d8648e77e7896ec11974651e4b5a0a0449ffeec622f588eface25a290ed9b39abc05ee98a1601fc9e704ec9fe1203235877b43b49887bf8c474a0da48353433ce68607db9b0dcc193925ce2cf3c9f4e611491a42d95c609aae32a29a287ddf2fb05a7fd5c4f922e54f9413850bbc258b2074dc1e65ea8f57270c22f8dc6973bdcdf4728478744cd675ce667dd6ed29f96794f0b3aa7bca422d6b5a238803ad812755de"}, @ra={0x5, 0x2, 0x1}, @padn={0x1, 0x1, [0x0]}]}}}, @rthdrdstopts={{0x28, 0x29, 0x37, {0x2f, 0x1, [], [@enc_lim={0x4, 0x1, 0xe2b4}, @pad1, @ra={0x5, 0x2, 0x400}]}}}], 0x200}}, {{0x0, 0x0, &(0x7f00000087c0)=[{&(0x7f0000007480)="7846d38d8d3baedd87a882034f283de36f1a56bcf4203363a61bf4f8bf6b0080acba988a04a47a68e5b2860b", 0x2c}, {&(0x7f00000074c0)}, {&(0x7f0000007500)="8e595441f25f98d469fa0dc8b71aa436cf8823", 0x13}, {&(0x7f0000007540)="7cb499b0160d49011cb001253eff5a2419e9b4a0fa2dda1af45aacaf508d270005b6b44de992d8", 0x27}, {&(0x7f0000007580)="4958af0c287f04c068f231ee5ae6cc81ff8167f472dee2c56dbf0c271c05367d57c0fc4970d6b69bffa7ed92d314851e3877e96b0f9f71472a131f04d9211a6780b6274bc83e92d3b53600dbb546fb411470799f1ad85d94a3258ac46bc17c8b446383165c02997cefda501edde4e7b165b5eec98299d3817b8645161d09503590091e8973bbd2d3a933b2db14952752afe0", 0x92}, {&(0x7f0000007640)="e30659efe03b9defafb23afd3f3ff38295499353b5c95663cb31ca4a6d6b620d104887af1dadfde1895af307e89241467bece9384dc3364e6bdedc46", 0x3c}, {&(0x7f0000007680)="a6ff77e9d357b4c435328280d3ea5715d5d342748f043c706160ee384f1d00568768a0a3a277f718605ae446de5496237c5fef4d589cf6b9c34cb911e4bd9782bfe6c91de100fc7c0afe0aa6d88f06ee1195b74654e4a79596dd1fabe2760c57537420b58ac5cae3", 0x68}, {&(0x7f0000007700)="68786285c31ea95b7636c2b58024a2091f541f98487dfdc60e1769ce879b428d454fb9f3cce356bfe39c7fc0989084faa15971564c0a4313e29631b4ad7f78931a53ffde6ca8b24a2d01504a3e380358e5491615dbaffedb46afc7989d6b6bbc3375a7bdc947fab1fbcb7358afeac62580a17a152c1d7cfcde83065f4420a6f99d256df66e0f8f379e66232ea1a139bb1a9eb9665da992a268807142af4656ecc7106cfe26c4848cd95d5c5fd7f0ad79550e602506f25c7cc577de2d7953d17b", 0xc0}, {&(0x7f00000077c0)="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", 0x1000}], 0x9, &(0x7f0000008880)=[@dstopts={{0x38, 0x29, 0x37, {0x6e, 0x3, [], [@pad1, @enc_lim, @pad1, @hao={0xc9, 0x10, @mcast2}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x40}}, @hopopts_2292={{0x58, 0x29, 0x36, {0x1, 0x7, [], [@padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0xec}, @ra={0x5, 0x2, 0x7}, @ra={0x5, 0x2, 0x100000000}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @loopback}, @jumbo={0xc2, 0x4, 0x8}, @pad1]}}}], 0xa8}}, {{0x0, 0x0, &(0x7f0000008b40)=[{&(0x7f0000008940)="811905ea179314d19da0f4f5d4ec8760a46726dd787a357b990b8592d5c5d6229cb06ab0d213711f18e6d4901aa40331b546b2da1260cf81d14d8bfb6ffcadd664adef1b0717eec20f06029f385ee47052c74dccac5ed3b91cb2a65e56bcec832c1ba8b736baafbb83082784c338acf3be081526c5edf627dd9e1eab959b32b128764bbef385060ea892", 0x8a}, {&(0x7f0000008a00)="504739bb234220e5c106855fc0312ef97bae1c62ba7d19f8df5f7cd6bb439bd51abcbdb2566cce3a10495770cc6e9d1fdd7e117b175421fc0c56c41eac50e5c4bf089fe239e457dae10f26154b3cdb256d3e7aa90c889773f7c72e2f4cf7b542de019c4ecf58aff8dad7a689bc0d1b3b76082bd453b0d05b57570b15f34d48fc7c712fe85e5e29055ab1aa9dc471d4bbf531c43ced914f748d1692f88a58c3bf13fecb68385239e9b1894f026cd11df7f75e551a71b8eb15eea1486202b29f67f169ec908acbdf6b474053f9cb8efe0573c849e2baf287d4ac2c28595abf64ee3ea23087d4dfa6484dbfcdcc38", 0xed}, {&(0x7f0000008b00)="56d3d3b214d0ea171aad6e95d20a82f3add197751bbe2841b2dcdc956b16794fa6", 0x21}], 0x3, &(0x7f0000008b80)=[@tclass={{0x14, 0x29, 0x43, 0x6}}], 0x18}}, {{&(0x7f0000008bc0)={0xa, 0x4e20, 0x7, @ipv4={[], [], @rand_addr=0x5}, 0x2}, 0x1c, &(0x7f0000009340)=[{&(0x7f0000008c00)="29abb2bf9ff4b8e96a503daf82f3c7addc1abd73f90767091d12b528d939a96359706d07ca0db85d1d769a14ee0d797bc037aa7a32ffa2d35a0c68b83ea31066456684315c74762868b527a38801b26bf41c8f73bf803f51a1b4e7000682aa7ee1d5a368d1f67ff2362e3b785f5d39bc0fc904ec788eb69d592ff10b939ad0008e93a90c5fda21bfab0a463d98bc71be548769651121b180a3e7b87beb069574e2728019ddf3eec163eb8cd36db009986a020927c533deed942ac4613ee1f284b1baba6dd7b4a1c859852487891965eee24b", 0xd2}, {&(0x7f0000008d00)="bc21cd797fa18436456436c63f3075ece2970b4fd833179d65c841f7dd255000cdb9c630fc00c8bfd5dbe1094eab20dba3170a58237cf285bf3cdd9716a1da9c3e12637f0582eed8f93e85a06120cc1b8b842ff66e59efe4fc7bca481b77f3668b3fe7569825b776a88a9373a0972751ed433ea975c9256a9410dea055afdc", 0x7f}, {&(0x7f0000008d80)="14474533391fa055d368007353916bd0251560bc87e340660158c2e5c97d1c335a18a46db6226ce5d12f0791331bc4866be037308d5963f280f9686b4f951ce83cfb21137212ec6d421aacde747b056ff97c2059e8644964be7a3d232ab6a164c37c581c50105a42590df8189b1f508ca2ada72990c976342b6d63430a704485bfbf50e479a2fad25104d1ed2fff816ec0346ae88d14c01043a20e7f846fb7719610c2a07df958575015a4094ea95b8c1db46f9e315094b48129570d79ec13e2f82baef74fa4999027f5b2c4106f6e4894572cd71a63f3b767c7533efc6287a1fd7f", 0xe2}, {&(0x7f0000008e80)="6a5947fa1ce0ff9205ce657ffb9c2cdfe9a07b1e8fd8f73216d6822d0fa73c814d2266398a53154ed05a124d6484f5b62ce64e31ed26736c5af974ee37ca8995c08ca4c072c6c9b0d7367951d1b3b85bc39ce7a609da82c333be98e17848ef6e3169c937e67d9ac8c40c4451f222c59c73c558615fa91f9df4ba5610ae64215f6b0ec845941ea5f52135949bf2b7d17cad4917512211e49029d6ede5d19eb2bd2b9977c2bf1770a2e5910331c9068e7d3614b926d86d37fe51b00112a8ede6d393aa35f2b622285d775d78d4819d960d2e02f0c2521ecbcf818849214879d0dd134319663be4c5e52d8edc3b7e4f3680690a887373db4e43", 0xf8}, {&(0x7f0000008f80)="c114f8b10d5fc82a7ea6f7c82adff993f0d6b2b4575e329b3ed84230005fbf94967cfc65ecb4c481856c3bf8d2d62ee0da518b99c2418900fe502c", 0x3b}, {&(0x7f0000008fc0)="e2bd9253e673cdaf6b6cee930ef38ff7df296b5c91b96d923c56ecdbeaba303b161dd0eaf66a2f044d2f5b46a002d3b176fd4156426d5a0342486a8d95593cf1a6208b96255be43dc998c162d2fcb109c5e06b706bec04a0d21021087ae723115490ad3f5f6ef3e8931b4659b4450055b042cd1d012c0c201d19702b2a6606bfcdcefe52dc78a169a356d3d3", 0x8c}, {&(0x7f0000009080)="03c0aa7e3301d54a1df869b030d94cdeffdc20f52d9eeea668705bfdbb6ab9eb1f0e2af6c971099953476e86c97eee3529b34d9c8c63c8d97a3b5b8c44610b4ec43c51702cfc86c5ce6f0ccc8d267b37e15090a3b3762fadb0b582b0e3e290da5becdd48051b2eb6806946abdd7ab4e5e6b8260b8948da3e5bd1b1f5b0143d9d1fd57715bf2a01d6c067d23342d10b551799dca808168a24c7d93673cddb7cc0fea195196c16d654cf7f6bbf333ed319aa34", 0xb2}, {&(0x7f0000009140)="93c3ba7c6a7bd2bea2e42a9704f384108cdc88cb8bfb86e7d63f56aa7eb31836f901ac91449283e7d12abe598ba56160f8bb318fcf392521db7778beed91bb150d705e75ea5500eec6f22a12031ec0211879eb66c204b57cf354d66d5ad058e354614159e53efeced6cf6d14937812adfe1a9cf07fc17e0fa0fae3c20df4fc947b2e3533cb0a2e9e3921d3c72de517a21ae0ffee346234fa7b5f5cfec64ff95d12d01a6f0462c3eeb584f3955a25114149845db0a178d4cfafb11263a50d25c1d6f841f999cf818fa260e273c2f4a55ac0c84448e44425d1ff580a2e5b968c0d7037609feae6792b0b", 0xe9}, {&(0x7f0000009240)="aa8ab35abd6ee85662180eb6fddbdc7f92371116d2028b195105d8fa2b11aa478a0ff597835504447d68cbfeeb54710d5496466b83598bf4377a8e95da663635d3ea10aaf06793e9e8306e6da20165", 0x4f}, {&(0x7f00000092c0)="8f58cb27bf7ebf2a80c623ae29eebb2fe8fd836873a0bd54e3954803e4d1328fb5e67dfcb6b5fe83678878a45d9c4dc541c4cf5901136a064678b6f9e0c2a541b8721bf2022f0cc61a3254a04f9404db11fdc1884e524d3c35590440", 0x5c}], 0xa, &(0x7f0000009440)=[@pktinfo={{0x24, 0x29, 0x32, {@dev={0xfe, 0x80, [], 0x29}, r2}}}, @dstopts={{0x28, 0x29, 0x37, {0x11, 0x1, [], [@enc_lim={0x4, 0x1, 0x2ae7}, @jumbo={0xc2, 0x4, 0x7ff}]}}}], 0x50}}, {{&(0x7f00000094c0)={0xa, 0x4e21, 0x3f, @dev={0xfe, 0x80, [], 0x24}, 0x8001}, 0x1c, &(0x7f0000009580)=[{&(0x7f0000009500)="7fcbc388933506d0acb673a0a642dd3bdf4e3d298a6a1e9dd813fbf046d837c85cdb3d2d448882f55ffce352af11f8626e96983d72c1b1d6f67218e03b897346846a55716c5a", 0x46}], 0x1, &(0x7f00000095c0)}}, {{&(0x7f0000009600)={0xa, 0x4e20, 0x2, @ipv4={[], [], @rand_addr=0x9}, 0x4}, 0x1c, &(0x7f0000009a00)=[{&(0x7f0000009640)="5ebe9a3c585d93c7197bc03ee4dd1b9012867a729ae8c4b69f41c205c741b0856b3dc7cf4fdc4f66fb3bc57cea45a5edee18a275526c6707a1b02e4c82d26831e7f6aacd5f3d26bff11f6e1ffd38a84d2afb4b2f52e5be554d506c07220ca7fb84283fb29abded0128d65b74b7d251d783696ca8a91648c9fc51cacbdf6c", 0x7e}, {&(0x7f00000096c0)="d3396d5cdf148a3052c400a3179296bed322509fb77bd8019be9228977e2d86b05e6384be3957929d658ada50a336fa428249ad83860f09087aee71bbf16ade3aaa2593bdcd6819c132586811cc4e18c86b29284ba5713f15906b60a951b1b44183846b7cedd1077c5a9cdf904d94095c75c8b7f285ac5d6b0941c6a92842e11fb24c6e2923e7ca69ba7ba394745c2798ad04483e36c885f9cd0c5836245e78ffedaeb7fef7e0b21239b4ef9febb", 0xae}, {&(0x7f0000009780)="a3fe0523c65f10eca35865d276135b9019084ac9c8f75f6dd8edcb41fde8f80aa5d3bc1a6d0ebd7487e1bfbb8d8ce373fe2f018475743ccb4c22bc21900e83fdcd9d4ee8832f", 0x46}, {&(0x7f0000009800)="5d8821d9984f39624c6a4e58003b1843cdfaeb32aabd0373890161ba2687f1da1353f153c8efc31303f134e3b3cc1d58", 0x30}, {&(0x7f0000009840)="7f18c347334955f42818735c3345c07ebfc60cdfbda76a8e87b3a0bf769bb5285e49ec6c45747ac977ad176883710ee93c5ee20a5e3c28461ad71c14f44936af07a4a22065558d379aa0990bfbaf9ea6bb4de13c0a3ac65e7798ef601bb2ba43a6801e58d45b8f3f6d7ba9eb232aaf98442814289bc8a7f17905c6d15e819b7ad45ec8cb874e310459d47c8e7db541c068789fba7621ce189fb9864400d2c5852e745d45f4190fb55a919d8f8dcf2db5c05ca79246fe314fe287897eb36cbfdb4ca0125ee69818c53b14b5fed014", 0xce}, {&(0x7f0000009940)="fb4c4bcd1c799e4e7f6a8b741aa22e0fc7b0f2afb5b9d255f9b16964c5a0621d19a067d0d2c72821ab45f611d84bfc3f7ec43bf365e9af8a310339247a406cc9044003f9ce0742f651efcfd1eb1812564330788766beb25784046a8a560845b30c1c26daa2538f53a8ffdc692789a180fb32055afdf4a41e1b7305377dc1198872aa8859b13823b0c377f2b8a0bad215607506d6e372274f071f9e483672d0f1892ac1b2103765", 0xa7}], 0x6}}], 0x9, 0x20008080) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) bind$nfc_llcp(r1, &(0x7f0000001800)={0x27, 0x0, 0x1, 0x7, 0xffffffffffffff7f, 0x8, "db9eed49668796d15c38514cca121fabc142f04ad23f40fe5e6b0de4daed18416b58c9faf97f81c9b566895730079e4b1524463b8ced3536df20cdd7d094d9", 0x2}, 0x60) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, &(0x7f0000001880)=0x2, 0x4) 22:55:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x0, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:28 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) 22:55:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='ip6_vt\xe90\x00 \x00', 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0xfffffffffffffffe, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000100000038040000000000000000000b0000000000000000000000000000000000000000008000000000"], 0x9e) setsockopt(r0, 0x3, 0x5, &(0x7f0000000000)="094c32d857ea39cb38fc4c41314bb9ddd2aea6613b2420aa37791f7999223f33ad4071fadaf0c69539fd5ed019ddf670352cdaaf12d9721241808f83d35cdb0d04e3659dd6", 0x45) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x40800, 0x0) recvfrom(r2, &(0x7f0000000240)=""/220, 0xdc, 0x100, 0x0, 0x0) 22:55:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x0, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) [ 3041.448396][T30041] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 3041.754377][ T26] audit: type=1800 audit(1564959329.200:33): pid=30045 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16562 res=0 [ 3041.993108][T10699] device bridge_slave_1 left promiscuous mode [ 3041.999281][T10699] bridge0: port 2(bridge_slave_1) entered disabled state [ 3042.053173][T10699] device bridge_slave_0 left promiscuous mode [ 3042.059311][T10699] bridge0: port 1(bridge_slave_0) entered disabled state [ 3042.742725][T10699] device hsr_slave_0 left promiscuous mode [ 3042.822457][T10699] device hsr_slave_1 left promiscuous mode [ 3042.867174][T10699] team0 (unregistering): Port device team_slave_1 removed [ 3042.877373][T10699] team0 (unregistering): Port device team_slave_0 removed [ 3042.887495][T10699] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3042.915438][T10699] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3042.971301][T10699] bond0 (unregistering): Released all slaves [ 3043.068019][T30049] IPVS: ftp: loaded support on port[0] = 21 [ 3043.117943][T30049] chnl_net:caif_netlink_parms(): no params data found [ 3043.142247][T30049] bridge0: port 1(bridge_slave_0) entered blocking state [ 3043.149438][T30049] bridge0: port 1(bridge_slave_0) entered disabled state [ 3043.156976][T30049] device bridge_slave_0 entered promiscuous mode [ 3043.164819][T30049] bridge0: port 2(bridge_slave_1) entered blocking state [ 3043.171859][T30049] bridge0: port 2(bridge_slave_1) entered disabled state [ 3043.179540][T30049] device bridge_slave_1 entered promiscuous mode [ 3043.194466][T30049] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3043.207849][T30049] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3043.222722][T30049] team0: Port device team_slave_0 added [ 3043.229154][T30049] team0: Port device team_slave_1 added [ 3043.273548][T30049] device hsr_slave_0 entered promiscuous mode [ 3043.322648][T30049] device hsr_slave_1 entered promiscuous mode [ 3043.382389][T30049] debugfs: Directory 'hsr0' with parent '/' already present! [ 3043.432618][T30049] bridge0: port 2(bridge_slave_1) entered blocking state [ 3043.439699][T30049] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3043.447032][T30049] bridge0: port 1(bridge_slave_0) entered blocking state [ 3043.454555][T30049] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3043.496312][T30049] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3043.511027][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3043.520388][ T9644] bridge0: port 1(bridge_slave_0) entered disabled state [ 3043.530643][ T9644] bridge0: port 2(bridge_slave_1) entered disabled state [ 3043.543810][T30049] 8021q: adding VLAN 0 to HW filter on device team0 [ 3043.554006][T14072] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3043.562884][T14072] bridge0: port 1(bridge_slave_0) entered blocking state [ 3043.569931][T14072] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3043.595739][T10691] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3043.604486][T10691] bridge0: port 2(bridge_slave_1) entered blocking state [ 3043.611524][T10691] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3043.624449][T10691] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3043.635999][T10691] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3043.644525][T10691] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3043.660854][T30049] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3043.676275][T30049] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3043.684881][T14072] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3043.695751][T14072] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3043.714651][T30049] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3043.862146][T30058] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3043.872460][T30058] CPU: 0 PID: 30058 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3043.880428][T30058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3043.890457][T30058] Call Trace: [ 3043.893729][T30058] dump_stack+0x1d8/0x2f8 [ 3043.898035][T30058] dump_header+0xd8/0x960 [ 3043.902404][T30058] oom_kill_process+0xcd/0x350 [ 3043.907182][T30058] out_of_memory+0x5c8/0x880 [ 3043.911746][T30058] memory_max_write+0x4ba/0x600 [ 3043.916585][T30058] ? memory_max_show+0xa0/0xa0 [ 3043.921321][T30058] cgroup_file_write+0x223/0x5f0 [ 3043.926231][T30058] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3043.931316][T30058] kernfs_fop_write+0x3e4/0x4f0 [ 3043.936144][T30058] ? kernfs_fop_read+0x580/0x580 [ 3043.941075][T30058] __vfs_write+0xb8/0x740 [ 3043.945381][T30058] ? check_preemption_disabled+0x47/0x2a0 [ 3043.951079][T30058] ? __sb_start_write+0x403/0x4c0 [ 3043.956077][T30058] vfs_write+0x275/0x590 [ 3043.960296][T30058] ksys_write+0x117/0x220 [ 3043.964603][T30058] __x64_sys_write+0x7b/0x90 [ 3043.969190][T30058] do_syscall_64+0xfe/0x140 [ 3043.973688][T30058] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3043.979553][T30058] RIP: 0033:0x459829 [ 3043.983433][T30058] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3044.003011][T30058] RSP: 002b:00007fcabc7d3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3044.011406][T30058] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 3044.019365][T30058] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 3044.027425][T30058] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 3044.035373][T30058] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcabc7d46d4 [ 3044.043318][T30058] R13: 00000000004c98fc R14: 00000000004e0ea8 R15: 00000000ffffffff [ 3044.051563][T30058] memory: usage 5492kB, limit 0kB, failcnt 3119907 [ 3044.058165][T30058] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3044.065106][T30058] Memory cgroup stats for /syz2: [ 3044.065189][T30058] anon 4333568 [ 3044.065189][T30058] file 143360 [ 3044.065189][T30058] kernel_stack 65536 [ 3044.065189][T30058] slab 987136 [ 3044.065189][T30058] sock 0 [ 3044.065189][T30058] shmem 0 [ 3044.065189][T30058] file_mapped 0 [ 3044.065189][T30058] file_dirty 0 [ 3044.065189][T30058] file_writeback 0 [ 3044.065189][T30058] anon_thp 4194304 [ 3044.065189][T30058] inactive_anon 0 [ 3044.065189][T30058] active_anon 4333568 [ 3044.065189][T30058] inactive_file 0 [ 3044.065189][T30058] active_file 0 [ 3044.065189][T30058] unevictable 0 [ 3044.065189][T30058] slab_reclaimable 270336 [ 3044.065189][T30058] slab_unreclaimable 716800 [ 3044.065189][T30058] pgfault 208956 [ 3044.065189][T30058] pgmajfault 0 [ 3044.065189][T30058] workingset_refault 0 [ 3044.065189][T30058] workingset_activate 0 [ 3044.065189][T30058] workingset_nodereclaim 0 [ 3044.065189][T30058] pgrefill 0 [ 3044.065189][T30058] pgscan 2083 [ 3044.065189][T30058] pgsteal 2083 [ 3044.065189][T30058] pgactivate 0 22:55:31 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x0) 22:55:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000240)={@dev, 0x0}, &(0x7f0000000280)=0x14) r2 = syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x4d, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1b, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x3, 0x1, 0x1, 0x0, 0x8, 0x0, 0xfffffffffffffffc}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x7, 0xc7, &(0x7f0000000100)=""/199, 0x41000, 0x0, [], r1, 0x0, r2, 0x8, &(0x7f0000000300)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x2, 0xe, 0x81}, 0x10}, 0x70) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f0000000580)={0x9, 0x7, 0x9, 0x35, &(0x7f0000000400)=""/53, 0x88, &(0x7f0000000440)=""/136, 0x49, &(0x7f0000000500)=""/73}) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c0500dee8102d00000000000001641005116601000038000000000000000900000b0000000000000046000000"], 0x9e) 22:55:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x0, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:31 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) [ 3044.161408][T30058] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=30056,uid=0 [ 3044.176918][T30058] Memory cgroup out of memory: Killed process 30056 (syz-executor.2) total-vm:72712kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB [ 3044.192390][ T1058] oom_reaper: reaped process 30056 (syz-executor.2), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB [ 3044.210592][T30049] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 3044.248586][T30049] CPU: 0 PID: 30049 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 22:55:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) [ 3044.256579][T30049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3044.266638][T30049] Call Trace: [ 3044.269996][T30049] dump_stack+0x1d8/0x2f8 [ 3044.274332][T30049] dump_header+0xd8/0x960 [ 3044.278661][T30049] oom_kill_process+0xcd/0x350 [ 3044.283431][T30049] out_of_memory+0x5c8/0x880 [ 3044.288025][T30049] try_charge+0x125a/0x1910 [ 3044.292550][T30049] mem_cgroup_try_charge+0x20c/0x680 [ 3044.297841][T30049] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3044.303475][T30049] wp_page_copy+0x35c/0x1980 [ 3044.308066][T30049] ? trace_lock_release+0x135/0x1a0 [ 3044.313263][T30049] ? do_wp_page+0x27f/0x1cc0 [ 3044.317862][T30049] ? __kasan_check_read+0x11/0x20 [ 3044.322884][T30049] ? do_raw_spin_unlock+0x49/0x260 [ 3044.327998][T30049] do_wp_page+0x5e5/0x1cc0 [ 3044.332414][T30049] ? __kasan_check_write+0x14/0x20 [ 3044.337545][T30049] handle_mm_fault+0x2adf/0x6010 [ 3044.342513][T30049] do_user_addr_fault+0x589/0xaf0 [ 3044.347547][T30049] __do_page_fault+0xd3/0x1f0 [ 3044.352235][T30049] do_page_fault+0x99/0xb0 [ 3044.356673][T30049] page_fault+0x39/0x40 [ 3044.360824][T30049] RIP: 0033:0x430906 [ 3044.364739][T30049] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 5c 46 64 00 85 c0 0f 84 [ 3044.384345][T30049] RSP: 002b:00007ffc6e227350 EFLAGS: 00010206 [ 3044.391930][T30049] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 3044.399928][T30049] RDX: 000055555727f930 RSI: 0000555557287970 RDI: 0000000000000003 [ 3044.407902][T30049] RBP: 0000000000008041 R08: 0000000000000001 R09: 000055555727e940 [ 3044.415873][T30049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 3044.423868][T30049] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 3044.444004][T30049] memory: usage 1064kB, limit 0kB, failcnt 3119919 [ 3044.461131][T30049] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 22:55:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x0, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x1, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) [ 3044.492491][T30049] Memory cgroup stats for /syz2: [ 3044.492569][T30049] anon 86016 [ 3044.492569][T30049] file 143360 [ 3044.492569][T30049] kernel_stack 0 [ 3044.492569][T30049] slab 987136 [ 3044.492569][T30049] sock 0 [ 3044.492569][T30049] shmem 0 [ 3044.492569][T30049] file_mapped 0 [ 3044.492569][T30049] file_dirty 0 [ 3044.492569][T30049] file_writeback 0 [ 3044.492569][T30049] anon_thp 0 [ 3044.492569][T30049] inactive_anon 0 [ 3044.492569][T30049] active_anon 86016 [ 3044.492569][T30049] inactive_file 0 22:55:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) [ 3044.492569][T30049] active_file 0 [ 3044.492569][T30049] unevictable 0 [ 3044.492569][T30049] slab_reclaimable 270336 [ 3044.492569][T30049] slab_unreclaimable 716800 [ 3044.492569][T30049] pgfault 208956 [ 3044.492569][T30049] pgmajfault 0 [ 3044.492569][T30049] workingset_refault 0 [ 3044.492569][T30049] workingset_activate 0 [ 3044.492569][T30049] workingset_nodereclaim 0 [ 3044.492569][T30049] pgrefill 0 [ 3044.492569][T30049] pgscan 2083 [ 3044.492569][T30049] pgsteal 2083 [ 3044.492569][T30049] pgactivate 0 22:55:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x0, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) [ 3044.643876][T30049] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=30049,uid=0 [ 3044.672382][T30049] Memory cgroup out of memory: Killed process 30049 (syz-executor.2) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 3044.735543][ T1058] oom_reaper: reaped process 30049 (syz-executor.2), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 22:55:32 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) 22:55:32 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x0, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioprio_set$uid(0x3, 0x0, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) 22:55:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=""/16, 0x10}}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000100)={0x7e, 0x0, [], [0xc1]}) 22:55:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x0, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) 22:55:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000040)={0x19, 0x2, 0x100}) r2 = getpgrp(0xffffffffffffffff) getpgid(r2) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c0500c2af5c42c955629f0000000000000164100511660100000038000000000000000900000b000000000000"], 0x9e) 22:55:32 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001300)=ANY=[@ANYBLOB], 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) dup2(0xffffffffffffffff, 0xffffffffffffffff) 22:55:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x0, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) [ 3046.562915][T12042] device bridge_slave_1 left promiscuous mode [ 3046.569224][T12042] bridge0: port 2(bridge_slave_1) entered disabled state [ 3046.633128][T12042] device bridge_slave_0 left promiscuous mode [ 3046.639401][T12042] bridge0: port 1(bridge_slave_0) entered disabled state [ 3047.352875][T12042] device hsr_slave_0 left promiscuous mode [ 3047.392847][T12042] device hsr_slave_1 left promiscuous mode [ 3047.447369][T12042] team0 (unregistering): Port device team_slave_1 removed [ 3047.458293][T12042] team0 (unregistering): Port device team_slave_0 removed [ 3047.468071][T12042] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3047.515978][T12042] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3047.590990][T12042] bond0 (unregistering): Released all slaves [ 3047.708253][T30542] IPVS: ftp: loaded support on port[0] = 21 [ 3047.760812][T30542] chnl_net:caif_netlink_parms(): no params data found [ 3047.849767][T30542] bridge0: port 1(bridge_slave_0) entered blocking state [ 3047.857520][T30542] bridge0: port 1(bridge_slave_0) entered disabled state [ 3047.868382][T30542] device bridge_slave_0 entered promiscuous mode [ 3047.876079][T30542] bridge0: port 2(bridge_slave_1) entered blocking state [ 3047.885923][T30542] bridge0: port 2(bridge_slave_1) entered disabled state [ 3047.893841][T30542] device bridge_slave_1 entered promiscuous mode [ 3047.915441][T30542] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3047.928927][T30542] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3047.950674][T30542] team0: Port device team_slave_0 added [ 3047.958048][T30542] team0: Port device team_slave_1 added [ 3048.024451][T30542] device hsr_slave_0 entered promiscuous mode [ 3048.082688][T30542] device hsr_slave_1 entered promiscuous mode [ 3048.122502][T30542] debugfs: Directory 'hsr0' with parent '/' already present! [ 3048.138867][T30542] bridge0: port 2(bridge_slave_1) entered blocking state [ 3048.146201][T30542] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3048.153658][T30542] bridge0: port 1(bridge_slave_0) entered blocking state [ 3048.160876][T30542] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3048.187862][T30542] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3048.200480][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3048.209464][ T9644] bridge0: port 1(bridge_slave_0) entered disabled state [ 3048.218608][ T9644] bridge0: port 2(bridge_slave_1) entered disabled state [ 3048.235347][T30542] 8021q: adding VLAN 0 to HW filter on device team0 [ 3048.246542][T14882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3048.255335][T14882] bridge0: port 1(bridge_slave_0) entered blocking state [ 3048.262915][T14882] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3048.286257][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3048.295113][ T9644] bridge0: port 2(bridge_slave_1) entered blocking state [ 3048.302418][ T9644] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3048.311353][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3048.320132][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3048.329278][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3048.341874][T30542] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3048.352947][T30542] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3048.366588][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3048.375490][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3048.384140][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3048.400193][T30542] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3048.556719][T30550] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3048.568253][T30550] CPU: 1 PID: 30550 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3048.576230][T30550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3048.586605][T30550] Call Trace: [ 3048.590032][T30550] dump_stack+0x1d8/0x2f8 [ 3048.594697][T30550] dump_header+0xd8/0x960 [ 3048.599239][T30550] oom_kill_process+0xcd/0x350 [ 3048.604011][T30550] out_of_memory+0x5c8/0x880 [ 3048.608605][T30550] memory_max_write+0x4ba/0x600 [ 3048.613607][T30550] ? memory_max_show+0xa0/0xa0 [ 3048.618559][T30550] cgroup_file_write+0x223/0x5f0 [ 3048.624047][T30550] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3048.629154][T30550] kernfs_fop_write+0x3e4/0x4f0 [ 3048.634020][T30550] ? kernfs_fop_read+0x580/0x580 [ 3048.639248][T30550] __vfs_write+0xb8/0x740 [ 3048.643701][T30550] ? check_preemption_disabled+0x3a/0x2a0 [ 3048.649605][T30550] ? __sb_start_write+0x403/0x4c0 [ 3048.654890][T30550] vfs_write+0x275/0x590 [ 3048.659138][T30550] ksys_write+0x117/0x220 [ 3048.663587][T30550] __x64_sys_write+0x7b/0x90 [ 3048.668374][T30550] do_syscall_64+0xfe/0x140 [ 3048.672940][T30550] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3048.678953][T30550] RIP: 0033:0x459829 [ 3048.683003][T30550] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3048.702936][T30550] RSP: 002b:00007f050ef92c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3048.711671][T30550] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 3048.720236][T30550] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 3048.728571][T30550] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3048.736657][T30550] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f050ef936d4 [ 3048.744856][T30550] R13: 00000000004c98fc R14: 00000000004e0ea8 R15: 00000000ffffffff [ 3048.756484][T30550] memory: usage 5456kB, limit 0kB, failcnt 3119928 [ 3048.764766][T30550] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3048.771837][T30550] Memory cgroup stats for /syz2: [ 3048.772057][T30550] anon 4362240 [ 3048.772057][T30550] file 143360 [ 3048.772057][T30550] kernel_stack 65536 [ 3048.772057][T30550] slab 987136 [ 3048.772057][T30550] sock 0 [ 3048.772057][T30550] shmem 0 [ 3048.772057][T30550] file_mapped 0 [ 3048.772057][T30550] file_dirty 0 [ 3048.772057][T30550] file_writeback 0 [ 3048.772057][T30550] anon_thp 4194304 [ 3048.772057][T30550] inactive_anon 0 [ 3048.772057][T30550] active_anon 4362240 [ 3048.772057][T30550] inactive_file 0 [ 3048.772057][T30550] active_file 0 [ 3048.772057][T30550] unevictable 0 [ 3048.772057][T30550] slab_reclaimable 270336 [ 3048.772057][T30550] slab_unreclaimable 716800 [ 3048.772057][T30550] pgfault 209022 [ 3048.772057][T30550] pgmajfault 0 [ 3048.772057][T30550] workingset_refault 0 [ 3048.772057][T30550] workingset_activate 0 [ 3048.772057][T30550] workingset_nodereclaim 0 [ 3048.772057][T30550] pgrefill 0 [ 3048.772057][T30550] pgscan 2083 [ 3048.772057][T30550] pgsteal 2083 [ 3048.772057][T30550] pgactivate 0 [ 3048.871621][T30550] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=30549,uid=0 [ 3048.889108][T30550] Memory cgroup out of memory: Killed process 30549 (syz-executor.2) total-vm:72712kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB 22:55:36 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000000)=""/26) 22:55:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x70) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x0, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:36 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) sendfile(r1, r5, 0x0, 0x87ff7) 22:55:36 executing program 5: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) [ 3048.905775][ T1058] oom_reaper: reaped process 30549 (syz-executor.2), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 3048.947458][T30542] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 22:55:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) [ 3049.002237][T30542] CPU: 0 PID: 30542 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3049.010595][T30542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3049.020835][T30542] Call Trace: [ 3049.024139][T30542] dump_stack+0x1d8/0x2f8 [ 3049.028501][T30542] dump_header+0xd8/0x960 [ 3049.032973][T30542] oom_kill_process+0xcd/0x350 [ 3049.037754][T30542] out_of_memory+0x5c8/0x880 [ 3049.042897][T30542] try_charge+0x125a/0x1910 [ 3049.047603][T30542] mem_cgroup_try_charge+0x20c/0x680 [ 3049.052900][T30542] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3049.058552][T30542] wp_page_copy+0x35c/0x1980 [ 3049.063365][T30542] ? trace_lock_release+0x135/0x1a0 [ 3049.068678][T30542] ? do_wp_page+0x27f/0x1cc0 [ 3049.073279][T30542] ? __kasan_check_read+0x11/0x20 [ 3049.078475][T30542] ? do_raw_spin_unlock+0x49/0x260 [ 3049.083598][T30542] do_wp_page+0x5e5/0x1cc0 [ 3049.088244][T30542] ? __kasan_check_write+0x14/0x20 [ 3049.093658][T30542] handle_mm_fault+0x2adf/0x6010 [ 3049.099041][T30542] do_user_addr_fault+0x589/0xaf0 [ 3049.104236][T30542] __do_page_fault+0xd3/0x1f0 [ 3049.109425][T30542] do_page_fault+0x99/0xb0 [ 3049.113924][T30542] page_fault+0x39/0x40 [ 3049.118268][T30542] RIP: 0033:0x430906 [ 3049.122164][T30542] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 5c 46 64 00 85 c0 0f 84 [ 3049.142149][T30542] RSP: 002b:00007ffd31ebc520 EFLAGS: 00010206 22:55:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x20000610) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) [ 3049.148510][T30542] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 3049.156832][T30542] RDX: 0000555556ee4930 RSI: 0000555556eec970 RDI: 0000000000000003 [ 3049.165078][T30542] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555556ee3940 [ 3049.173177][T30542] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 3049.181381][T30542] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 22:55:36 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) sendfile(r1, r5, 0x0, 0x87ff7) 22:55:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x8000, 0x0) linkat(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x1400) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) 22:55:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) [ 3049.312406][T30542] memory: usage 1068kB, limit 0kB, failcnt 3119937 [ 3049.325447][T30542] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3049.339952][T30542] Memory cgroup stats for /syz2: [ 3049.340032][T30542] anon 57344 [ 3049.340032][T30542] file 143360 [ 3049.340032][T30542] kernel_stack 0 [ 3049.340032][T30542] slab 987136 [ 3049.340032][T30542] sock 0 [ 3049.340032][T30542] shmem 0 [ 3049.340032][T30542] file_mapped 0 [ 3049.340032][T30542] file_dirty 0 [ 3049.340032][T30542] file_writeback 0 [ 3049.340032][T30542] anon_thp 0 [ 3049.340032][T30542] inactive_anon 0 [ 3049.340032][T30542] active_anon 57344 [ 3049.340032][T30542] inactive_file 0 [ 3049.340032][T30542] active_file 0 [ 3049.340032][T30542] unevictable 0 [ 3049.340032][T30542] slab_reclaimable 270336 [ 3049.340032][T30542] slab_unreclaimable 716800 [ 3049.340032][T30542] pgfault 209022 [ 3049.340032][T30542] pgmajfault 0 22:55:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1f, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bpq0='bpq0\x00', 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @bcast, @null]}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) [ 3049.340032][T30542] workingset_refault 0 [ 3049.340032][T30542] workingset_activate 0 [ 3049.340032][T30542] workingset_nodereclaim 0 [ 3049.340032][T30542] pgrefill 0 [ 3049.340032][T30542] pgscan 2083 [ 3049.340032][T30542] pgsteal 2083 [ 3049.340032][T30542] pgactivate 0 [ 3049.517449][T30542] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=30542,uid=0 [ 3049.538296][T30542] Memory cgroup out of memory: Killed process 30542 (syz-executor.2) total-vm:72448kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB [ 3049.576812][ T1058] oom_reaper: reaped process 30542 (syz-executor.2), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 3049.592055][T30626] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3049.603908][T30626] CPU: 1 PID: 30626 Comm: syz-executor.5 Not tainted 5.3.0-rc2+ #63 [ 3049.612161][T30626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3049.622521][T30626] Call Trace: [ 3049.622539][T30626] dump_stack+0x1d8/0x2f8 [ 3049.622555][T30626] dump_header+0xd8/0x960 [ 3049.622571][T30626] oom_kill_process+0xcd/0x350 [ 3049.622583][T30626] out_of_memory+0x5c8/0x880 [ 3049.622598][T30626] memory_max_write+0x4ba/0x600 [ 3049.622615][T30626] ? memory_max_show+0xa0/0xa0 [ 3049.654589][T30626] cgroup_file_write+0x223/0x5f0 [ 3049.660058][T30626] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3049.665163][T30626] kernfs_fop_write+0x3e4/0x4f0 [ 3049.670155][T30626] ? kernfs_fop_read+0x580/0x580 [ 3049.675261][T30626] __vfs_write+0xb8/0x740 [ 3049.679827][T30626] ? check_preemption_disabled+0x47/0x2a0 [ 3049.685983][T30626] ? __sb_start_write+0x403/0x4c0 [ 3049.691149][T30626] vfs_write+0x275/0x590 [ 3049.695519][T30626] ksys_write+0x117/0x220 [ 3049.699898][T30626] __x64_sys_write+0x7b/0x90 [ 3049.704480][T30626] do_syscall_64+0xfe/0x140 [ 3049.709193][T30626] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3049.715198][T30626] RIP: 0033:0x459829 [ 3049.719225][T30626] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3049.739298][T30626] RSP: 002b:00007f72f5d60c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3049.747871][T30626] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 3049.756263][T30626] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 3049.764296][T30626] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 3049.772551][T30626] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f72f5d616d4 [ 3049.780797][T30626] R13: 00000000004c98fc R14: 00000000004e0ea8 R15: 00000000ffffffff [ 3049.792500][T30626] memory: usage 28944kB, limit 0kB, failcnt 15 [ 3049.799674][T30626] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3049.808654][T30626] Memory cgroup stats for /syz5: [ 3049.808705][T30626] anon 22138880 [ 3049.808705][T30626] file 90112 [ 3049.808705][T30626] kernel_stack 327680 [ 3049.808705][T30626] slab 5447680 [ 3049.808705][T30626] sock 0 [ 3049.808705][T30626] shmem 61440 [ 3049.808705][T30626] file_mapped 0 [ 3049.808705][T30626] file_dirty 135168 [ 3049.808705][T30626] file_writeback 0 [ 3049.808705][T30626] anon_thp 20971520 [ 3049.808705][T30626] inactive_anon 0 [ 3049.808705][T30626] active_anon 22065152 [ 3049.808705][T30626] inactive_file 135168 [ 3049.808705][T30626] active_file 0 [ 3049.808705][T30626] unevictable 0 [ 3049.808705][T30626] slab_reclaimable 2433024 [ 3049.808705][T30626] slab_unreclaimable 3014656 [ 3049.808705][T30626] pgfault 271557 [ 3049.808705][T30626] pgmajfault 0 [ 3049.808705][T30626] workingset_refault 0 [ 3049.808705][T30626] workingset_activate 0 [ 3049.808705][T30626] workingset_nodereclaim 0 [ 3049.808705][T30626] pgrefill 0 [ 3049.808705][T30626] pgscan 0 [ 3049.808705][T30626] pgsteal 0 [ 3049.808705][T30626] pgactivate 0 [ 3049.909326][T30626] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=30556,uid=0 [ 3049.924924][T30626] Memory cgroup out of memory: Killed process 30626 (syz-executor.5) total-vm:72708kB, anon-rss:4248kB, file-rss:35828kB, shmem-rss:0kB [ 3049.955390][T19445] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 3049.965370][T19445] CPU: 0 PID: 19445 Comm: syz-executor.5 Not tainted 5.3.0-rc2+ #63 [ 3049.973522][T19445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3049.983579][T19445] Call Trace: [ 3049.987106][T19445] dump_stack+0x1d8/0x2f8 [ 3049.991439][T19445] dump_header+0xd8/0x960 [ 3049.995795][T19445] oom_kill_process+0xcd/0x350 [ 3050.000677][T19445] out_of_memory+0x5c8/0x880 [ 3050.005448][T19445] try_charge+0x125a/0x1910 [ 3050.010398][T19445] mem_cgroup_try_charge+0x20c/0x680 [ 3050.015687][T19445] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3050.021347][T19445] wp_page_copy+0x35c/0x1980 [ 3050.025941][T19445] ? trace_lock_release+0x135/0x1a0 [ 3050.031522][T19445] ? do_wp_page+0x27f/0x1cc0 [ 3050.036202][T19445] ? __kasan_check_read+0x11/0x20 [ 3050.041303][T19445] ? do_raw_spin_unlock+0x49/0x260 [ 3050.046416][T19445] do_wp_page+0x5e5/0x1cc0 [ 3050.050828][T19445] ? __kasan_check_write+0x14/0x20 [ 3050.055942][T19445] handle_mm_fault+0x2adf/0x6010 [ 3050.061055][T19445] do_user_addr_fault+0x589/0xaf0 [ 3050.066205][T19445] __do_page_fault+0xd3/0x1f0 [ 3050.070881][T19445] do_page_fault+0x99/0xb0 [ 3050.075299][T19445] page_fault+0x39/0x40 [ 3050.079454][T19445] RIP: 0033:0x43090a [ 3050.083351][T19445] Code: 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 5c 46 64 00 85 c0 0f 84 3a f7 ff ff [ 3050.103763][T19445] RSP: 002b:00007ffe37732170 EFLAGS: 00010206 [ 3050.109827][T19445] RAX: 0000000000010651 RBX: 0000000000715640 RCX: 0000000000008041 [ 3050.118172][T19445] RDX: 00005555567ec970 RSI: 00005555567f49b0 RDI: 0000000000000003 [ 3050.126141][T19445] RBP: 0000000000008041 R08: 0000000000000000 R09: 000000000000000a [ 3050.134301][T19445] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000715698 [ 3050.142471][T19445] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 3050.156614][T19445] memory: usage 24504kB, limit 0kB, failcnt 23 [ 3050.163019][T19445] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3050.169901][T19445] Memory cgroup stats for /syz5: [ 3050.169989][T19445] anon 17870848 [ 3050.169989][T19445] file 90112 [ 3050.169989][T19445] kernel_stack 327680 [ 3050.169989][T19445] slab 5447680 [ 3050.169989][T19445] sock 0 [ 3050.169989][T19445] shmem 61440 [ 3050.169989][T19445] file_mapped 0 [ 3050.169989][T19445] file_dirty 135168 [ 3050.169989][T19445] file_writeback 0 [ 3050.169989][T19445] anon_thp 16777216 [ 3050.169989][T19445] inactive_anon 0 [ 3050.169989][T19445] active_anon 17797120 [ 3050.169989][T19445] inactive_file 135168 [ 3050.169989][T19445] active_file 0 [ 3050.169989][T19445] unevictable 0 [ 3050.169989][T19445] slab_reclaimable 2433024 [ 3050.169989][T19445] slab_unreclaimable 3014656 [ 3050.169989][T19445] pgfault 271557 [ 3050.169989][T19445] pgmajfault 0 [ 3050.169989][T19445] workingset_refault 0 [ 3050.169989][T19445] workingset_activate 0 [ 3050.169989][T19445] workingset_nodereclaim 0 [ 3050.169989][T19445] pgrefill 0 [ 3050.169989][T19445] pgscan 0 [ 3050.169989][T19445] pgsteal 0 [ 3050.169989][T19445] pgactivate 0 [ 3050.267832][T19445] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=27576,uid=0 [ 3050.284948][T19445] Memory cgroup out of memory: Killed process 27576 (syz-executor.5) total-vm:72708kB, anon-rss:2200kB, file-rss:35784kB, shmem-rss:0kB [ 3050.300589][ T1058] oom_reaper: reaped process 27576 (syz-executor.5), now anon-rss:0kB, file-rss:34824kB, shmem-rss:0kB [ 3050.315004][T19445] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 3050.325628][T19445] CPU: 1 PID: 19445 Comm: syz-executor.5 Not tainted 5.3.0-rc2+ #63 [ 3050.333841][T19445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3050.344133][T19445] Call Trace: [ 3050.344149][T19445] dump_stack+0x1d8/0x2f8 [ 3050.344162][T19445] dump_header+0xd8/0x960 [ 3050.344175][T19445] oom_kill_process+0xcd/0x350 [ 3050.352033][T19445] out_of_memory+0x5c8/0x880 [ 3050.361437][T19445] try_charge+0x125a/0x1910 [ 3050.370952][T19445] mem_cgroup_try_charge+0x20c/0x680 [ 3050.376394][T19445] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3050.376407][T19445] wp_page_copy+0x35c/0x1980 [ 3050.376421][T19445] ? trace_lock_release+0x135/0x1a0 [ 3050.388068][T19445] ? do_wp_page+0x27f/0x1cc0 [ 3050.388083][T19445] ? __kasan_check_read+0x11/0x20 [ 3050.388093][T19445] ? do_raw_spin_unlock+0x49/0x260 [ 3050.388106][T19445] do_wp_page+0x5e5/0x1cc0 [ 3050.398480][T19445] ? __kasan_check_write+0x14/0x20 [ 3050.408707][T19445] handle_mm_fault+0x2adf/0x6010 [ 3050.418432][T19445] do_user_addr_fault+0x589/0xaf0 [ 3050.428738][T19445] __do_page_fault+0xd3/0x1f0 [ 3050.433420][T19445] do_page_fault+0x99/0xb0 [ 3050.433433][T19445] page_fault+0x39/0x40 [ 3050.433464][T19445] RIP: 0033:0x43090a [ 3050.442043][T19445] Code: 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 5c 46 64 00 85 c0 0f 84 3a f7 ff ff [ 3050.466732][T19445] RSP: 002b:00007ffe37732170 EFLAGS: 00010206 [ 3050.472872][T19445] RAX: 0000000000010651 RBX: 0000000000715640 RCX: 0000000000008041 [ 3050.481004][T19445] RDX: 00005555567ec970 RSI: 00005555567f49b0 RDI: 0000000000000003 [ 3050.489517][T19445] RBP: 0000000000008041 R08: 0000000000000000 R09: 000000000000000a [ 3050.498253][T19445] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000715698 [ 3050.506689][T19445] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 3050.516307][T19445] memory: usage 22100kB, limit 0kB, failcnt 35 [ 3050.524434][T19445] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3050.531559][T19445] Memory cgroup stats for /syz5: [ 3050.531606][T19445] anon 15605760 [ 3050.531606][T19445] file 90112 [ 3050.531606][T19445] kernel_stack 262144 [ 3050.531606][T19445] slab 5447680 [ 3050.531606][T19445] sock 0 [ 3050.531606][T19445] shmem 61440 [ 3050.531606][T19445] file_mapped 0 [ 3050.531606][T19445] file_dirty 135168 [ 3050.531606][T19445] file_writeback 0 [ 3050.531606][T19445] anon_thp 14680064 [ 3050.531606][T19445] inactive_anon 0 [ 3050.531606][T19445] active_anon 15605760 [ 3050.531606][T19445] inactive_file 135168 [ 3050.531606][T19445] active_file 0 [ 3050.531606][T19445] unevictable 0 [ 3050.531606][T19445] slab_reclaimable 2433024 [ 3050.531606][T19445] slab_unreclaimable 3014656 [ 3050.531606][T19445] pgfault 271557 [ 3050.531606][T19445] pgmajfault 0 [ 3050.531606][T19445] workingset_refault 0 [ 3050.531606][T19445] workingset_activate 0 [ 3050.531606][T19445] workingset_nodereclaim 0 [ 3050.531606][T19445] pgrefill 0 [ 3050.531606][T19445] pgscan 0 [ 3050.531606][T19445] pgsteal 0 [ 3050.531606][T19445] pgactivate 0 [ 3050.630538][T19445] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=24526,uid=0 [ 3050.646980][T19445] Memory cgroup out of memory: Killed process 24526 (syz-executor.5) total-vm:72708kB, anon-rss:2200kB, file-rss:35784kB, shmem-rss:0kB [ 3050.662797][ T1058] oom_reaper: reaped process 24526 (syz-executor.5), now anon-rss:0kB, file-rss:34824kB, shmem-rss:0kB 22:55:38 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000100)={0xffff, 0x5, 0x3, 'queue1\x00', 0x7fff}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000380)={&(0x7f0000000040), 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xe4, r3, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xa5e}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x94}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_BEARER={0x84, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4c90}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'syzkaller0\x00'}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'vcan0\x00'}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9f}]}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x20048050}, 0x4) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x38) 22:55:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) sendfile(r1, r5, 0x0, 0x87ff7) 22:55:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000780)={{0x2, 0x2, 0x1f, 0x0, '\x00', 0x4}, 0x1, [0x80, 0x9, 0x2, 0x9, 0x6, 0x0, 0x80000000, 0x9, 0xb46, 0x4, 0x7fffffff, 0x5, 0x61, 0x80000000, 0x7, 0x8, 0xffff, 0x6, 0x3, 0xfffffffffffffeff, 0x3, 0x3, 0x9, 0x7, 0x2, 0xfffffffffffff2a8, 0xfa, 0x100, 0x9, 0x2, 0xc67e, 0xef6, 0x6, 0x7, 0x2, 0xffffffffffffff01, 0x58af, 0x9, 0x400, 0x0, 0x3ff, 0x6000000000000000, 0xff, 0x9, 0x3, 0x800, 0x1, 0x7, 0x9, 0x2e9, 0x6, 0x40000000000000, 0x1, 0x1, 0x100000, 0x0, 0x48, 0xf04, 0x3, 0x9, 0x2, 0x800, 0x5f16, 0x4, 0x100, 0x3ff, 0x0, 0x4, 0x13f, 0x6, 0x3, 0x7, 0x7fff, 0x1, 0x1, 0x7, 0x101, 0x0, 0x9, 0x8, 0xfffffffffffffff9, 0x3, 0xffffffff00000001, 0x0, 0x3, 0x6, 0x7, 0xffffffffffff8000, 0xa0, 0x7b5b834f, 0x361, 0x0, 0x7, 0x39, 0x100, 0x5, 0xc14, 0x2, 0x1000, 0x7, 0x5, 0x1, 0xfffffffffffffffb, 0x2e, 0x1, 0x4, 0x2, 0x3, 0x3, 0xfffffffffffffffd, 0x100000001, 0x5, 0x2, 0x10000, 0x5, 0x6caa, 0x9, 0x2, 0x6, 0x1, 0x3f, 0x7fffffff, 0x380000000, 0x3, 0x9, 0x1, 0x7, 0x5], {0x77359400}}) socket$kcm(0x11, 0x6, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r3}, 0x10) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x9, 0x80) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8c010100}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x24, r5, 0x10c, 0x70bd26, 0x25dfdbfe, {{}, 0x0, 0x4, 0x0, {0x8}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x40000) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r2, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:38 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) sendfile(r1, r5, 0x0, 0x87ff7) [ 3050.665287][T19445] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 3050.711224][T19445] CPU: 0 PID: 19445 Comm: syz-executor.5 Not tainted 5.3.0-rc2+ #63 [ 3050.719245][T19445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3050.729855][T19445] Call Trace: [ 3050.733156][T19445] dump_stack+0x1d8/0x2f8 [ 3050.737500][T19445] dump_header+0xd8/0x960 [ 3050.741983][T19445] oom_kill_process+0xcd/0x350 [ 3050.746900][T19445] out_of_memory+0x5c8/0x880 [ 3050.751499][T19445] try_charge+0x125a/0x1910 [ 3050.756403][T19445] mem_cgroup_try_charge+0x20c/0x680 [ 3050.761823][T19445] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3050.767649][T19445] wp_page_copy+0x35c/0x1980 [ 3050.772243][T19445] ? trace_lock_release+0x135/0x1a0 [ 3050.777691][T19445] ? do_wp_page+0x27f/0x1cc0 [ 3050.782587][T19445] ? __kasan_check_read+0x11/0x20 [ 3050.787613][T19445] ? do_raw_spin_unlock+0x49/0x260 [ 3050.792754][T19445] do_wp_page+0x5e5/0x1cc0 [ 3050.797555][T19445] ? __kasan_check_write+0x14/0x20 [ 3050.802910][T19445] handle_mm_fault+0x2adf/0x6010 [ 3050.807886][T19445] do_user_addr_fault+0x589/0xaf0 [ 3050.813068][T19445] __do_page_fault+0xd3/0x1f0 [ 3050.818020][T19445] do_page_fault+0x99/0xb0 [ 3050.822538][T19445] page_fault+0x39/0x40 [ 3050.826707][T19445] RIP: 0033:0x43090a [ 3050.830738][T19445] Code: 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 5c 46 64 00 85 c0 0f 84 3a f7 ff ff [ 3050.850616][T19445] RSP: 002b:00007ffe37732170 EFLAGS: 00010206 22:55:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) [ 3050.856685][T19445] RAX: 0000000000010651 RBX: 0000000000715640 RCX: 0000000000008041 [ 3050.864657][T19445] RDX: 00005555567ec970 RSI: 00005555567f49b0 RDI: 0000000000000003 [ 3050.872877][T19445] RBP: 0000000000008041 R08: 0000000000000000 R09: 000000000000000a [ 3050.881037][T19445] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000715698 [ 3050.889034][T19445] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 3050.942344][T19445] memory: usage 19700kB, limit 0kB, failcnt 41 [ 3050.948892][T19445] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3050.948896][T19445] Memory cgroup stats for /syz5: [ 3050.948983][T19445] anon 13389824 [ 3050.948983][T19445] file 90112 [ 3050.948983][T19445] kernel_stack 262144 [ 3050.948983][T19445] slab 5447680 [ 3050.948983][T19445] sock 0 [ 3050.948983][T19445] shmem 61440 [ 3050.948983][T19445] file_mapped 0 [ 3050.948983][T19445] file_dirty 135168 [ 3050.948983][T19445] file_writeback 0 [ 3050.948983][T19445] anon_thp 12582912 [ 3050.948983][T19445] inactive_anon 0 [ 3050.948983][T19445] active_anon 13389824 [ 3050.948983][T19445] inactive_file 135168 [ 3050.948983][T19445] active_file 0 [ 3050.948983][T19445] unevictable 0 [ 3050.948983][T19445] slab_reclaimable 2433024 [ 3050.948983][T19445] slab_unreclaimable 3014656 [ 3050.948983][T19445] pgfault 271557 [ 3050.948983][T19445] pgmajfault 0 [ 3050.948983][T19445] workingset_refault 0 [ 3050.948983][T19445] workingset_activate 0 [ 3050.948983][T19445] workingset_nodereclaim 0 22:55:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e1f, @local}, 0x1269ebab0eca981e) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) [ 3050.948983][T19445] pgrefill 0 [ 3050.948983][T19445] pgscan 0 [ 3050.948983][T19445] pgsteal 0 [ 3050.948983][T19445] pgactivate 0 22:55:38 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) r3 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) symlinkat(&(0x7f0000000080)='./file0\x00', r3, &(0x7f0000000100)='./file0\x00') bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) creat(0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) 22:55:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getrandom(&(0x7f0000000240)=""/148, 0x94, 0x4) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) 22:55:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x280100, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000100)=0xb) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(0x0, 0xae) [ 3051.508174][T19445] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=24396,uid=0 22:55:39 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) creat(0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) [ 3051.592679][T19445] Memory cgroup out of memory: Killed process 24396 (syz-executor.5) total-vm:72708kB, anon-rss:2200kB, file-rss:35784kB, shmem-rss:0kB [ 3051.896855][T19445] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 3051.920798][T19445] CPU: 0 PID: 19445 Comm: syz-executor.5 Not tainted 5.3.0-rc2+ #63 [ 3051.928800][T19445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3051.939203][T19445] Call Trace: [ 3051.942511][T19445] dump_stack+0x1d8/0x2f8 [ 3051.947019][T19445] dump_header+0xd8/0x960 [ 3051.951358][T19445] oom_kill_process+0xcd/0x350 [ 3051.956128][T19445] out_of_memory+0x5c8/0x880 [ 3051.960725][T19445] try_charge+0x125a/0x1910 [ 3051.965561][T19445] mem_cgroup_try_charge+0x20c/0x680 [ 3051.970972][T19445] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3051.976710][T19445] wp_page_copy+0x35c/0x1980 [ 3051.981400][T19445] ? trace_lock_release+0x135/0x1a0 [ 3051.986713][T19445] ? do_wp_page+0x27f/0x1cc0 [ 3051.991417][T19445] ? __kasan_check_read+0x11/0x20 [ 3051.996676][T19445] ? do_raw_spin_unlock+0x49/0x260 [ 3052.001773][T19445] do_wp_page+0x5e5/0x1cc0 [ 3052.006428][T19445] ? __kasan_check_write+0x14/0x20 [ 3052.011831][T19445] handle_mm_fault+0x2adf/0x6010 [ 3052.017126][T19445] do_user_addr_fault+0x589/0xaf0 [ 3052.022336][T19445] __do_page_fault+0xd3/0x1f0 [ 3052.027018][T19445] do_page_fault+0x99/0xb0 [ 3052.031556][T19445] page_fault+0x39/0x40 [ 3052.035704][T19445] RIP: 0033:0x43090a [ 3052.039588][T19445] Code: 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 5c 46 64 00 85 c0 0f 84 3a f7 ff ff [ 3052.059572][T19445] RSP: 002b:00007ffe37732170 EFLAGS: 00010206 [ 3052.065702][T19445] RAX: 0000000000010651 RBX: 0000000000715640 RCX: 0000000000008041 [ 3052.073665][T19445] RDX: 00005555567ec970 RSI: 00005555567f49b0 RDI: 0000000000000003 [ 3052.081866][T19445] RBP: 0000000000008041 R08: 0000000000000000 R09: 000000000000000a [ 3052.089998][T19445] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000715698 [ 3052.098136][T19445] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 3052.109549][T19445] memory: usage 17228kB, limit 0kB, failcnt 47 [ 3052.116067][T19445] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3052.124250][T19445] Memory cgroup stats for /syz5: [ 3052.124337][T19445] anon 11182080 [ 3052.124337][T19445] file 90112 [ 3052.124337][T19445] kernel_stack 196608 [ 3052.124337][T19445] slab 5447680 [ 3052.124337][T19445] sock 0 [ 3052.124337][T19445] shmem 61440 [ 3052.124337][T19445] file_mapped 0 [ 3052.124337][T19445] file_dirty 135168 [ 3052.124337][T19445] file_writeback 0 [ 3052.124337][T19445] anon_thp 10485760 [ 3052.124337][T19445] inactive_anon 0 [ 3052.124337][T19445] active_anon 11182080 [ 3052.124337][T19445] inactive_file 135168 [ 3052.124337][T19445] active_file 0 [ 3052.124337][T19445] unevictable 0 [ 3052.124337][T19445] slab_reclaimable 2433024 [ 3052.124337][T19445] slab_unreclaimable 3014656 [ 3052.124337][T19445] pgfault 271557 [ 3052.124337][T19445] pgmajfault 0 [ 3052.124337][T19445] workingset_refault 0 [ 3052.124337][T19445] workingset_activate 0 [ 3052.124337][T19445] workingset_nodereclaim 0 [ 3052.124337][T19445] pgrefill 0 [ 3052.124337][T19445] pgscan 0 [ 3052.124337][T19445] pgsteal 0 [ 3052.124337][T19445] pgactivate 0 [ 3052.223602][T19445] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=27467,uid=0 [ 3052.239363][T19445] Memory cgroup out of memory: Killed process 27467 (syz-executor.5) total-vm:72576kB, anon-rss:2192kB, file-rss:35784kB, shmem-rss:0kB [ 3052.257622][T19445] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 3052.267716][T19445] CPU: 1 PID: 19445 Comm: syz-executor.5 Not tainted 5.3.0-rc2+ #63 [ 3052.275954][T19445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3052.286155][T19445] Call Trace: [ 3052.289525][T19445] dump_stack+0x1d8/0x2f8 [ 3052.293848][T19445] dump_header+0xd8/0x960 [ 3052.298249][T19445] oom_kill_process+0xcd/0x350 [ 3052.303167][T19445] out_of_memory+0x5c8/0x880 [ 3052.308030][T19445] try_charge+0x125a/0x1910 [ 3052.312879][T19445] mem_cgroup_try_charge+0x20c/0x680 [ 3052.318381][T19445] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3052.324114][T19445] wp_page_copy+0x35c/0x1980 [ 3052.328697][T19445] ? trace_lock_release+0x135/0x1a0 [ 3052.334467][T19445] ? do_wp_page+0x27f/0x1cc0 [ 3052.339050][T19445] ? __kasan_check_read+0x11/0x20 [ 3052.352314][T19445] ? do_raw_spin_unlock+0x49/0x260 [ 3052.357815][T19445] do_wp_page+0x5e5/0x1cc0 [ 3052.362327][T19445] ? __kasan_check_write+0x14/0x20 [ 3052.367741][T19445] handle_mm_fault+0x2adf/0x6010 [ 3052.372829][T19445] do_user_addr_fault+0x589/0xaf0 [ 3052.378004][T19445] __do_page_fault+0xd3/0x1f0 [ 3052.382672][T19445] do_page_fault+0x99/0xb0 [ 3052.387887][T19445] page_fault+0x39/0x40 [ 3052.392119][T19445] RIP: 0033:0x43090a [ 3052.396002][T19445] Code: 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 5c 46 64 00 85 c0 0f 84 3a f7 ff ff [ 3052.416468][T19445] RSP: 002b:00007ffe37732170 EFLAGS: 00010206 [ 3052.422937][T19445] RAX: 0000000000010651 RBX: 0000000000715640 RCX: 0000000000008041 [ 3052.430900][T19445] RDX: 00005555567ec970 RSI: 00005555567f49b0 RDI: 0000000000000003 [ 3052.439266][T19445] RBP: 0000000000008041 R08: 0000000000000000 R09: 000000000000000a [ 3052.447440][T19445] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000715698 [ 3052.455802][T19445] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 3052.467846][T19445] memory: usage 14840kB, limit 0kB, failcnt 53 [ 3052.475618][T19445] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3052.485314][T19445] Memory cgroup stats for /syz5: [ 3052.485409][T19445] anon 8970240 [ 3052.485409][T19445] file 90112 [ 3052.485409][T19445] kernel_stack 196608 [ 3052.485409][T19445] slab 5447680 [ 3052.485409][T19445] sock 0 [ 3052.485409][T19445] shmem 61440 [ 3052.485409][T19445] file_mapped 0 [ 3052.485409][T19445] file_dirty 135168 [ 3052.485409][T19445] file_writeback 0 [ 3052.485409][T19445] anon_thp 8388608 [ 3052.485409][T19445] inactive_anon 0 [ 3052.485409][T19445] active_anon 8970240 [ 3052.485409][T19445] inactive_file 135168 [ 3052.485409][T19445] active_file 0 [ 3052.485409][T19445] unevictable 0 [ 3052.485409][T19445] slab_reclaimable 2433024 [ 3052.485409][T19445] slab_unreclaimable 3014656 [ 3052.485409][T19445] pgfault 271557 [ 3052.485409][T19445] pgmajfault 0 [ 3052.485409][T19445] workingset_refault 0 [ 3052.485409][T19445] workingset_activate 0 [ 3052.485409][T19445] workingset_nodereclaim 0 [ 3052.485409][T19445] pgrefill 0 [ 3052.485409][T19445] pgscan 0 [ 3052.485409][T19445] pgsteal 0 [ 3052.485409][T19445] pgactivate 0 [ 3052.588227][T19445] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=27335,uid=0 [ 3052.605145][T19445] Memory cgroup out of memory: Killed process 27335 (syz-executor.5) total-vm:72576kB, anon-rss:2192kB, file-rss:35784kB, shmem-rss:0kB [ 3052.620756][T19445] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 3052.620864][ T1058] oom_reaper: reaped process 27335 (syz-executor.5), now anon-rss:0kB, file-rss:34824kB, shmem-rss:0kB [ 3052.631159][T19445] CPU: 0 PID: 19445 Comm: syz-executor.5 Not tainted 5.3.0-rc2+ #63 [ 3052.650372][T19445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3052.660428][T19445] Call Trace: [ 3052.663721][T19445] dump_stack+0x1d8/0x2f8 [ 3052.668468][T19445] dump_header+0xd8/0x960 [ 3052.672878][T19445] oom_kill_process+0xcd/0x350 [ 3052.678055][T19445] out_of_memory+0x5c8/0x880 [ 3052.682850][T19445] try_charge+0x125a/0x1910 [ 3052.687360][T19445] mem_cgroup_try_charge+0x20c/0x680 [ 3052.692645][T19445] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3052.698266][T19445] wp_page_copy+0x35c/0x1980 [ 3052.702855][T19445] ? trace_lock_release+0x135/0x1a0 [ 3052.708550][T19445] ? do_wp_page+0x27f/0x1cc0 [ 3052.713367][T19445] ? __kasan_check_read+0x11/0x20 [ 3052.718462][T19445] ? do_raw_spin_unlock+0x49/0x260 [ 3052.723572][T19445] do_wp_page+0x5e5/0x1cc0 [ 3052.728165][T19445] ? __kasan_check_write+0x14/0x20 [ 3052.733543][T19445] handle_mm_fault+0x2adf/0x6010 [ 3052.738567][T19445] do_user_addr_fault+0x589/0xaf0 [ 3052.743745][T19445] __do_page_fault+0xd3/0x1f0 [ 3052.748421][T19445] do_page_fault+0x99/0xb0 [ 3052.753111][T19445] page_fault+0x39/0x40 [ 3052.757390][T19445] RIP: 0033:0x43090a [ 3052.761338][T19445] Code: 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 5c 46 64 00 85 c0 0f 84 3a f7 ff ff [ 3052.781849][T19445] RSP: 002b:00007ffe37732170 EFLAGS: 00010206 [ 3052.788047][T19445] RAX: 0000000000010651 RBX: 0000000000715640 RCX: 0000000000008041 [ 3052.796334][T19445] RDX: 00005555567ec970 RSI: 00005555567f49b0 RDI: 0000000000000003 [ 3052.804313][T19445] RBP: 0000000000008041 R08: 0000000000000000 R09: 000000000000000a [ 3052.812778][T19445] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000715698 [ 3052.820799][T19445] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 3052.830909][T19445] memory: usage 12452kB, limit 0kB, failcnt 59 [ 3052.837145][T19445] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3052.846873][T19445] Memory cgroup stats for /syz5: [ 3052.846960][T19445] anon 6758400 [ 3052.846960][T19445] file 90112 [ 3052.846960][T19445] kernel_stack 131072 [ 3052.846960][T19445] slab 5447680 [ 3052.846960][T19445] sock 0 [ 3052.846960][T19445] shmem 61440 [ 3052.846960][T19445] file_mapped 0 [ 3052.846960][T19445] file_dirty 135168 [ 3052.846960][T19445] file_writeback 0 [ 3052.846960][T19445] anon_thp 6291456 [ 3052.846960][T19445] inactive_anon 0 [ 3052.846960][T19445] active_anon 6758400 [ 3052.846960][T19445] inactive_file 135168 [ 3052.846960][T19445] active_file 0 [ 3052.846960][T19445] unevictable 0 [ 3052.846960][T19445] slab_reclaimable 2433024 [ 3052.846960][T19445] slab_unreclaimable 3014656 [ 3052.846960][T19445] pgfault 271557 [ 3052.846960][T19445] pgmajfault 0 [ 3052.846960][T19445] workingset_refault 0 [ 3052.846960][T19445] workingset_activate 0 [ 3052.846960][T19445] workingset_nodereclaim 0 [ 3052.846960][T19445] pgrefill 0 [ 3052.846960][T19445] pgscan 0 [ 3052.846960][T19445] pgsteal 0 [ 3052.846960][T19445] pgactivate 0 [ 3052.948313][T19445] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=27217,uid=0 [ 3052.963936][T19445] Memory cgroup out of memory: Killed process 27217 (syz-executor.5) total-vm:72576kB, anon-rss:2192kB, file-rss:34816kB, shmem-rss:0kB [ 3052.988368][T19445] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 3052.998371][T19445] CPU: 1 PID: 19445 Comm: syz-executor.5 Not tainted 5.3.0-rc2+ #63 [ 3053.006514][T19445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3053.016833][T19445] Call Trace: [ 3053.016850][T19445] dump_stack+0x1d8/0x2f8 [ 3053.016863][T19445] dump_header+0xd8/0x960 [ 3053.016874][T19445] oom_kill_process+0xcd/0x350 [ 3053.016887][T19445] out_of_memory+0x5c8/0x880 [ 3053.038729][T19445] try_charge+0x125a/0x1910 [ 3053.043261][T19445] mem_cgroup_try_charge+0x20c/0x680 [ 3053.043275][T19445] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3053.054430][T19445] wp_page_copy+0x35c/0x1980 [ 3053.054441][T19445] ? trace_lock_release+0x135/0x1a0 [ 3053.054456][T19445] ? do_wp_page+0x27f/0x1cc0 [ 3053.054472][T19445] ? __kasan_check_read+0x11/0x20 [ 3053.069030][T19445] ? do_raw_spin_unlock+0x49/0x260 [ 3053.079413][T19445] do_wp_page+0x5e5/0x1cc0 [ 3053.083997][T19445] ? __kasan_check_write+0x14/0x20 [ 3053.084012][T19445] handle_mm_fault+0x2adf/0x6010 [ 3053.084035][T19445] do_user_addr_fault+0x589/0xaf0 [ 3053.094084][T19445] __do_page_fault+0xd3/0x1f0 [ 3053.094095][T19445] do_page_fault+0x99/0xb0 [ 3053.094108][T19445] page_fault+0x39/0x40 [ 3053.094120][T19445] RIP: 0033:0x43090a [ 3053.103820][T19445] Code: 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 5c 46 64 00 85 c0 0f 84 3a f7 ff ff [ 3053.103826][T19445] RSP: 002b:00007ffe37732170 EFLAGS: 00010206 [ 3053.103834][T19445] RAX: 0000000000010651 RBX: 0000000000715640 RCX: 0000000000008041 [ 3053.103844][T19445] RDX: 00005555567ec970 RSI: 00005555567f49b0 RDI: 0000000000000003 [ 3053.112839][T19445] RBP: 0000000000008041 R08: 0000000000000000 R09: 000000000000000a [ 3053.112845][T19445] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000715698 [ 3053.112850][T19445] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 3053.122345][T19445] memory: usage 10124kB, limit 0kB, failcnt 65 [ 3053.151153][T19445] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3053.167557][T19445] Memory cgroup stats for /syz5: [ 3053.167643][T19445] anon 4542464 [ 3053.167643][T19445] file 90112 [ 3053.167643][T19445] kernel_stack 131072 [ 3053.167643][T19445] slab 5447680 [ 3053.167643][T19445] sock 0 [ 3053.167643][T19445] shmem 61440 [ 3053.167643][T19445] file_mapped 0 [ 3053.167643][T19445] file_dirty 135168 [ 3053.167643][T19445] file_writeback 0 [ 3053.167643][T19445] anon_thp 4194304 [ 3053.167643][T19445] inactive_anon 0 [ 3053.167643][T19445] active_anon 4542464 [ 3053.167643][T19445] inactive_file 135168 [ 3053.167643][T19445] active_file 0 [ 3053.167643][T19445] unevictable 0 [ 3053.167643][T19445] slab_reclaimable 2433024 [ 3053.167643][T19445] slab_unreclaimable 3014656 [ 3053.167643][T19445] pgfault 271557 [ 3053.167643][T19445] pgmajfault 0 [ 3053.167643][T19445] workingset_refault 0 [ 3053.167643][T19445] workingset_activate 0 [ 3053.167643][T19445] workingset_nodereclaim 0 [ 3053.167643][T19445] pgrefill 0 [ 3053.167643][T19445] pgscan 0 [ 3053.167643][T19445] pgsteal 0 [ 3053.167643][T19445] pgactivate 0 [ 3053.184103][T19445] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=27041,uid=0 [ 3053.197463][T19445] Memory cgroup out of memory: Killed process 27041 (syz-executor.5) total-vm:72576kB, anon-rss:2192kB, file-rss:34816kB, shmem-rss:0kB [ 3053.298786][ T1058] oom_reaper: reaped process 27041 (syz-executor.5), now anon-rss:0kB, file-rss:34688kB, shmem-rss:0kB [ 3053.327699][T19445] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 3053.352074][T31140] IPVS: ftp: loaded support on port[0] = 21 [ 3053.355180][T19445] CPU: 0 PID: 19445 Comm: syz-executor.5 Not tainted 5.3.0-rc2+ #63 [ 3053.366328][T19445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3053.376384][T19445] Call Trace: [ 3053.376400][T19445] dump_stack+0x1d8/0x2f8 [ 3053.376412][T19445] dump_header+0xd8/0x960 [ 3053.376422][T19445] oom_kill_process+0xcd/0x350 [ 3053.376432][T19445] out_of_memory+0x5c8/0x880 [ 3053.376443][T19445] try_charge+0x125a/0x1910 [ 3053.376466][T19445] mem_cgroup_try_charge+0x20c/0x680 [ 3053.376484][T19445] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3053.384179][T19445] wp_page_copy+0x35c/0x1980 [ 3053.393344][T19445] ? trace_lock_release+0x135/0x1a0 [ 3053.393353][T19445] ? do_wp_page+0x27f/0x1cc0 [ 3053.393367][T19445] ? __kasan_check_read+0x11/0x20 [ 3053.393376][T19445] ? do_raw_spin_unlock+0x49/0x260 [ 3053.393387][T19445] do_wp_page+0x5e5/0x1cc0 [ 3053.393398][T19445] ? __kasan_check_write+0x14/0x20 [ 3053.393412][T19445] handle_mm_fault+0x2adf/0x6010 [ 3053.402554][T19445] do_user_addr_fault+0x589/0xaf0 [ 3053.402570][T19445] __do_page_fault+0xd3/0x1f0 [ 3053.402581][T19445] do_page_fault+0x99/0xb0 [ 3053.402593][T19445] page_fault+0x39/0x40 [ 3053.402606][T19445] RIP: 0033:0x43090a [ 3053.413640][T19445] Code: 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 5c 46 64 00 85 c0 0f 84 3a f7 ff ff [ 3053.413646][T19445] RSP: 002b:00007ffe37732170 EFLAGS: 00010206 [ 3053.413653][T19445] RAX: 0000000000010651 RBX: 0000000000715640 RCX: 0000000000008041 [ 3053.413659][T19445] RDX: 00005555567ec970 RSI: 00005555567f49b0 RDI: 0000000000000003 [ 3053.413664][T19445] RBP: 0000000000008041 R08: 0000000000000000 R09: 000000000000000a [ 3053.413669][T19445] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000715698 [ 3053.413675][T19445] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 3053.415611][T19445] memory: usage 7784kB, limit 0kB, failcnt 71 [ 3053.424137][T19445] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3053.433912][T19445] Memory cgroup stats for /syz5: [ 3053.434051][T19445] anon 2338816 [ 3053.434051][T19445] file 90112 [ 3053.434051][T19445] kernel_stack 65536 [ 3053.434051][T19445] slab 5447680 [ 3053.434051][T19445] sock 0 [ 3053.434051][T19445] shmem 61440 [ 3053.434051][T19445] file_mapped 0 [ 3053.434051][T19445] file_dirty 135168 [ 3053.434051][T19445] file_writeback 0 [ 3053.434051][T19445] anon_thp 2097152 [ 3053.434051][T19445] inactive_anon 0 [ 3053.434051][T19445] active_anon 2338816 [ 3053.434051][T19445] inactive_file 135168 [ 3053.434051][T19445] active_file 0 [ 3053.434051][T19445] unevictable 0 [ 3053.434051][T19445] slab_reclaimable 2433024 [ 3053.434051][T19445] slab_unreclaimable 3014656 [ 3053.434051][T19445] pgfault 271557 [ 3053.434051][T19445] pgmajfault 0 [ 3053.434051][T19445] workingset_refault 0 [ 3053.434051][T19445] workingset_activate 0 [ 3053.434051][T19445] workingset_nodereclaim 0 [ 3053.434051][T19445] pgrefill 0 [ 3053.434051][T19445] pgscan 0 [ 3053.434051][T19445] pgsteal 0 [ 3053.434051][T19445] pgactivate 0 [ 3053.452633][T19445] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=26969,uid=0 [ 3053.458911][T19445] Memory cgroup out of memory: Killed process 26969 (syz-executor.5) total-vm:72576kB, anon-rss:2192kB, file-rss:34816kB, shmem-rss:0kB [ 3053.479197][T19445] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 3053.502887][T19445] CPU: 0 PID: 19445 Comm: syz-executor.5 Not tainted 5.3.0-rc2+ #63 [ 3053.518313][T19445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3053.518318][T19445] Call Trace: [ 3053.518334][T19445] dump_stack+0x1d8/0x2f8 [ 3053.518346][T19445] dump_header+0xd8/0x960 [ 3053.518357][T19445] oom_kill_process+0xcd/0x350 [ 3053.518367][T19445] out_of_memory+0x5c8/0x880 [ 3053.518379][T19445] try_charge+0x125a/0x1910 [ 3053.518403][T19445] mem_cgroup_try_charge+0x20c/0x680 [ 3053.518417][T19445] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3053.534646][T19445] wp_page_copy+0x35c/0x1980 [ 3053.534657][T19445] ? trace_lock_release+0x135/0x1a0 [ 3053.534665][T19445] ? do_wp_page+0x27f/0x1cc0 [ 3053.534680][T19445] ? __kasan_check_read+0x11/0x20 [ 3053.534694][T19445] ? do_raw_spin_unlock+0x49/0x260 [ 3053.548754][T19445] do_wp_page+0x5e5/0x1cc0 [ 3053.560838][T19445] ? __kasan_check_write+0x14/0x20 [ 3053.667622][T19445] handle_mm_fault+0x2adf/0x6010 [ 3053.667647][T19445] do_user_addr_fault+0x589/0xaf0 [ 3053.667663][T19445] __do_page_fault+0xd3/0x1f0 [ 3053.691962][T19445] do_page_fault+0x99/0xb0 [ 3053.710737][T19445] page_fault+0x39/0x40 [ 3053.710747][T19445] RIP: 0033:0x43090a [ 3053.710756][T19445] Code: 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 5c 46 64 00 85 c0 0f 84 3a f7 ff ff [ 3053.710762][T19445] RSP: 002b:00007ffe37732170 EFLAGS: 00010206 [ 3053.710769][T19445] RAX: 0000000000010651 RBX: 0000000000715640 RCX: 0000000000008041 [ 3053.710775][T19445] RDX: 00005555567ec970 RSI: 00005555567f49b0 RDI: 0000000000000003 [ 3053.710780][T19445] RBP: 0000000000008041 R08: 0000000000000000 R09: 000000000000000a [ 3053.710786][T19445] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000715698 [ 3053.710791][T19445] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 3053.877014][T19445] memory: usage 5424kB, limit 0kB, failcnt 77 [ 3053.884142][T19445] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3053.891590][T19445] Memory cgroup stats for [ 3053.891601][T19445] /syz5: [ 3053.891684][T19445] anon 122880 [ 3053.891684][T19445] file 90112 [ 3053.891684][T19445] kernel_stack 65536 [ 3053.891684][T19445] slab 5447680 [ 3053.891684][T19445] sock 0 [ 3053.891684][T19445] shmem 61440 [ 3053.891684][T19445] file_mapped 0 [ 3053.891684][T19445] file_dirty 135168 [ 3053.891684][T19445] file_writeback 0 [ 3053.891684][T19445] anon_thp 0 [ 3053.891684][T19445] inactive_anon 0 [ 3053.891684][T19445] active_anon 122880 [ 3053.891684][T19445] inactive_file 135168 [ 3053.891684][T19445] active_file 0 [ 3053.891684][T19445] unevictable 0 [ 3053.891684][T19445] slab_reclaimable 2433024 [ 3053.891684][T19445] slab_unreclaimable 3014656 [ 3053.891684][T19445] pgfault 271557 [ 3053.891684][T19445] pgmajfault 0 [ 3053.891684][T19445] workingset_refault 0 [ 3053.891684][T19445] workingset_activate 0 [ 3053.891684][T19445] workingset_nodereclaim 0 [ 3053.891684][T19445] pgrefill 0 [ 3053.891684][T19445] pgscan 0 [ 3053.891684][T19445] pgsteal 0 [ 3053.891684][T19445] pgactivate 0 [ 3053.991795][T19445] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=19445,uid=0 [ 3054.007801][T19445] Memory cgroup out of memory: Killed process 19445 (syz-executor.5) total-vm:72444kB, anon-rss:100kB, file-rss:35776kB, shmem-rss:0kB [ 3054.073410][T31140] chnl_net:caif_netlink_parms(): no params data found 22:55:41 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) sendfile(r1, r5, 0x0, 0x87ff7) 22:55:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x1ff}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000100)={r2, 0xdd, "ab03436821eef0e263e85f2bee3c825a7752325c1b256672a5b70094b846983e6150898b199b07fe265835a5a4f9418844711a018b61d122cfd80c7e0def57c4502502aae8e5044aa1ad0b27e4b3793f96115811ca78672487d1f6f3f9dd3b81026c78b048aebdc24ee9180465d9851ca31ed02a76894db48ef34ab06c4f8b4378253f579eb6090cb810c90c9d7188f58196f2b47b54a19425b6d273de508f9d18408afc33481503b709db95e5a668c76630b4eb3d6f245c6c8720862c2664dfb91565c7cbe52bcd55abd89c460cb5468b6adf0e1b0bf5b04e4ce2f005"}, &(0x7f0000000240)=0xe5) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) 22:55:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(0x0, 0xae) [ 3054.199963][T31140] bridge0: port 1(bridge_slave_0) entered blocking state [ 3054.217266][T31140] bridge0: port 1(bridge_slave_0) entered disabled state [ 3054.233360][T31140] device bridge_slave_0 entered promiscuous mode [ 3054.315553][T31140] bridge0: port 2(bridge_slave_1) entered blocking state [ 3054.323908][T31140] bridge0: port 2(bridge_slave_1) entered disabled state [ 3054.331671][T31140] device bridge_slave_1 entered promiscuous mode [ 3054.346523][T31140] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3054.357248][T31140] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3054.376174][T31140] team0: Port device team_slave_0 added [ 3054.382586][T10708] device bridge_slave_1 left promiscuous mode [ 3054.389930][T10708] bridge0: port 2(bridge_slave_1) entered disabled state [ 3054.422888][T10708] device bridge_slave_0 left promiscuous mode [ 3054.429098][T10708] bridge0: port 1(bridge_slave_0) entered disabled state [ 3055.093075][T10708] device hsr_slave_0 left promiscuous mode [ 3055.162474][T10708] device hsr_slave_1 left promiscuous mode [ 3055.237834][T10708] team0 (unregistering): Port device team_slave_1 removed [ 3055.248711][T10708] team0 (unregistering): Port device team_slave_0 removed [ 3055.258932][T10708] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3055.325963][T10708] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3055.391280][T10708] bond0 (unregistering): Released all slaves [ 3055.476597][T31140] team0: Port device team_slave_1 added [ 3055.523841][T31140] device hsr_slave_0 entered promiscuous mode [ 3055.572721][T31140] device hsr_slave_1 entered promiscuous mode [ 3055.632428][T31140] debugfs: Directory 'hsr0' with parent '/' already present! [ 3055.666741][T31140] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3055.677881][T14882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3055.686217][T14882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3055.697810][T31140] 8021q: adding VLAN 0 to HW filter on device team0 [ 3055.744317][T14072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3055.753092][T14072] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3055.761396][T14072] bridge0: port 1(bridge_slave_0) entered blocking state [ 3055.768598][T14072] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3055.784231][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3055.792075][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3055.800758][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3055.809217][ T9644] bridge0: port 2(bridge_slave_1) entered blocking state [ 3055.816312][ T9644] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3055.827531][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3055.836406][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3055.857380][T31140] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3055.868643][T31140] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3055.881060][T10691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3055.890121][T10691] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3055.899771][T10691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3055.912186][T10691] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3055.923930][T10691] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3055.934599][T10691] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3055.951983][T31140] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3055.962433][T14072] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3055.970016][T14072] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3056.169072][T31253] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3056.179952][T31253] CPU: 1 PID: 31253 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3056.188439][T31253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3056.198497][T31253] Call Trace: [ 3056.201780][T31253] dump_stack+0x1d8/0x2f8 [ 3056.206103][T31253] dump_header+0xd8/0x960 [ 3056.210627][T31253] oom_kill_process+0xcd/0x350 [ 3056.215526][T31253] out_of_memory+0x5c8/0x880 [ 3056.220238][T31253] memory_max_write+0x4ba/0x600 [ 3056.225091][T31253] ? memory_max_show+0xa0/0xa0 [ 3056.229844][T31253] cgroup_file_write+0x223/0x5f0 [ 3056.235110][T31253] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3056.240212][T31253] kernfs_fop_write+0x3e4/0x4f0 [ 3056.245140][T31253] ? kernfs_fop_read+0x580/0x580 [ 3056.250083][T31253] __vfs_write+0xb8/0x740 [ 3056.254441][T31253] ? check_preemption_disabled+0x47/0x2a0 [ 3056.260214][T31253] ? __sb_start_write+0x403/0x4c0 [ 3056.265237][T31253] vfs_write+0x275/0x590 [ 3056.269640][T31253] ksys_write+0x117/0x220 [ 3056.274070][T31253] __x64_sys_write+0x7b/0x90 [ 3056.278991][T31253] do_syscall_64+0xfe/0x140 [ 3056.283902][T31253] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3056.289916][T31253] RIP: 0033:0x459829 [ 3056.294083][T31253] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3056.314038][T31253] RSP: 002b:00007efff6f5bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3056.322437][T31253] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 3056.330588][T31253] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 3056.338549][T31253] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3056.346602][T31253] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efff6f5c6d4 [ 3056.354825][T31253] R13: 00000000004c98fc R14: 00000000004e0ea8 R15: 00000000ffffffff [ 3056.368561][T31253] memory: usage 5420kB, limit 0kB, failcnt 3119946 [ 3056.377486][T31253] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3056.386270][T31253] Memory cgroup stats for /syz2: [ 3056.387425][T31253] anon 4313088 [ 3056.387425][T31253] file 143360 [ 3056.387425][T31253] kernel_stack 0 [ 3056.387425][T31253] slab 851968 [ 3056.387425][T31253] sock 0 [ 3056.387425][T31253] shmem 0 [ 3056.387425][T31253] file_mapped 0 [ 3056.387425][T31253] file_dirty 0 [ 3056.387425][T31253] file_writeback 0 [ 3056.387425][T31253] anon_thp 4194304 [ 3056.387425][T31253] inactive_anon 0 [ 3056.387425][T31253] active_anon 4313088 [ 3056.387425][T31253] inactive_file 0 [ 3056.387425][T31253] active_file 0 [ 3056.387425][T31253] unevictable 0 [ 3056.387425][T31253] slab_reclaimable 270336 [ 3056.387425][T31253] slab_unreclaimable 581632 [ 3056.387425][T31253] pgfault 209088 [ 3056.387425][T31253] pgmajfault 0 [ 3056.387425][T31253] workingset_refault 0 [ 3056.387425][T31253] workingset_activate 0 [ 3056.387425][T31253] workingset_nodereclaim 0 [ 3056.387425][T31253] pgrefill 0 [ 3056.387425][T31253] pgscan 2083 [ 3056.387425][T31253] pgsteal 2083 [ 3056.387425][T31253] pgactivate 0 [ 3056.484197][T31253] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=31252,uid=0 [ 3056.500932][T31253] Memory cgroup out of memory: Killed process 31252 (syz-executor.2) total-vm:72712kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB 22:55:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) creat(0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) 22:55:44 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000001180)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) syz_mount_image$minix(&(0x7f0000000240)='minix\x00', &(0x7f0000000280)='./file0\x00', 0x10001, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="8f745ec7a7cdf30fced5c726f09a4f5fc14464f7e630fd043970ba4a", 0x1c, 0x8}], 0x41020, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r2 = openat$cgroup_int(r0, &(0x7f00000000c0)='\x02\x00\x00\x00ry.\t\x00\x00\xa9\x1a0n\xe6\xee\xbe\x1b\xc7n\xa7\x00', 0x2, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0}, 0x10) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() fsetxattr$security_smack_transmute(r3, &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x2) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) openat$cgroup_int(r0, &(0x7f0000000200)='cgroup.max.descendants\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x12002}, 0xc, &(0x7f00000003c0)={&(0x7f0000000e80)=ANY=[@ANYBLOB="34408d006809d8b696960d4b8da8435eaefd2c33f22acf0500d59e5e4082d52bfe0771e32b3bff0654a6f0f974c26a0271860c8fb56083defcaca91b0488053ff54c41277ae72cc5029a", @ANYRES16=r4, @ANYBLOB="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"], 0x28c}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1000) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r2, 0x0, 0xfffffffffffffe11) mkdir(0x0, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000480)='/dev/vcs#\x00', 0x0, 0x400) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a40)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f00000004c0)=0x106) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000640)={r6, @in={{0x2, 0x4e24, @rand_addr=0x7}}, 0xfff, 0x6, 0x9d8c, 0x8000, 0x40}, 0x29e) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x80100, 0x0) ioctl$RNDADDTOENTCNT(r7, 0x40045201, &(0x7f0000000080)=0x2) 22:55:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(0x0, 0xae) 22:55:44 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) sendfile(r1, r5, 0x0, 0x87ff7) 22:55:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00000000000000000000000000004027358418e9f5962753ab41958bad9e7ee0e7138f3e220396a6fd2bfaf1d3962aa1735fd70a"], 0x9e) [ 3056.520359][ T1058] oom_reaper: reaped process 31252 (syz-executor.2), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 3056.558399][T31140] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 3056.603259][T31140] CPU: 0 PID: 31140 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3056.611256][T31140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3056.621298][T31140] Call Trace: [ 3056.624575][T31140] dump_stack+0x1d8/0x2f8 [ 3056.628893][T31140] dump_header+0xd8/0x960 [ 3056.633210][T31140] oom_kill_process+0xcd/0x350 [ 3056.637962][T31140] out_of_memory+0x5c8/0x880 [ 3056.642540][T31140] try_charge+0x125a/0x1910 [ 3056.647054][T31140] mem_cgroup_try_charge+0x20c/0x680 [ 3056.652324][T31140] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3056.657940][T31140] handle_mm_fault+0x312f/0x6010 [ 3056.662878][T31140] do_user_addr_fault+0x589/0xaf0 [ 3056.667891][T31140] __do_page_fault+0xd3/0x1f0 [ 3056.672549][T31140] do_page_fault+0x99/0xb0 [ 3056.676948][T31140] page_fault+0x39/0x40 [ 3056.681088][T31140] RIP: 0033:0x4577c1 [ 3056.684978][T31140] Code: 48 81 ec 98 00 00 00 0f 05 48 3d 00 f0 ff ff 48 89 c3 0f 87 e9 00 00 00 85 db 0f 88 2f 01 00 00 48 89 e2 89 de bf 01 00 00 00 ba 13 00 00 85 c0 0f 88 98 00 00 00 8b 44 24 18 25 00 f0 00 00 [ 3056.704589][T31140] RSP: 002b:00007fffb953cfb0 EFLAGS: 00010206 [ 3056.710634][T31140] RAX: 0000000000000003 RBX: 0000000000000003 RCX: 00000000004577a0 [ 3056.718588][T31140] RDX: 00007fffb953cfb0 RSI: 0000000000000003 RDI: 0000000000000001 [ 3056.726541][T31140] RBP: 0000000000000002 R08: 0000000000000001 R09: 00005555569a9940 [ 3056.734492][T31140] R10: 0000000000000000 R11: 0000000000000202 R12: 00007fffb953e190 [ 3056.742444][T31140] R13: 00007fffb953e180 R14: 0000000000000000 R15: 00007fffb953e190 [ 3056.752649][T31140] memory: usage 1032kB, limit 0kB, failcnt 3119955 [ 3056.759166][T31140] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3056.777874][T31140] Memory cgroup stats for /syz2: [ 3056.777948][T31140] anon 61440 [ 3056.777948][T31140] file 143360 [ 3056.777948][T31140] kernel_stack 0 [ 3056.777948][T31140] slab 851968 [ 3056.777948][T31140] sock 0 [ 3056.777948][T31140] shmem 0 [ 3056.777948][T31140] file_mapped 0 [ 3056.777948][T31140] file_dirty 0 [ 3056.777948][T31140] file_writeback 0 [ 3056.777948][T31140] anon_thp 0 [ 3056.777948][T31140] inactive_anon 0 [ 3056.777948][T31140] active_anon 61440 [ 3056.777948][T31140] inactive_file 0 [ 3056.777948][T31140] active_file 0 [ 3056.777948][T31140] unevictable 0 [ 3056.777948][T31140] slab_reclaimable 270336 [ 3056.777948][T31140] slab_unreclaimable 581632 [ 3056.777948][T31140] pgfault 209088 [ 3056.777948][T31140] pgmajfault 0 [ 3056.777948][T31140] workingset_refault 0 [ 3056.777948][T31140] workingset_activate 0 [ 3056.777948][T31140] workingset_nodereclaim 0 [ 3056.777948][T31140] pgrefill 0 [ 3056.777948][T31140] pgscan 2083 [ 3056.777948][T31140] pgsteal 2083 [ 3056.777948][T31140] pgactivate 0 [ 3056.817033][T31140] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=31140,uid=0 22:55:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) [ 3056.935934][T31140] Memory cgroup out of memory: Killed process 31140 (syz-executor.2) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB 22:55:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) 22:55:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) getsockopt$netlink(r0, 0x10e, 0x3, &(0x7f0000000100)=""/173, &(0x7f0000000000)=0xad) [ 3056.982241][ T1058] oom_reaper: reaped process 31140 (syz-executor.2), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 22:55:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) r1 = socket$kcm(0x11, 0x6, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r3}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) getsockname(r1, &(0x7f0000000080)=@generic, &(0x7f0000000100)=0x80) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r2, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xdd, &(0x7f0000000100)="d5ca7862194c2633aa3025e172d42300ed15efc7113f795caa66babd10a56f1843b6c5d56bc160e453020c0a372a0134928309cdcb928f043f1e52fc0b845b8f67747f2e0b5b042295f4d92b5c1f207208127d4443efca9c762b3f6087f292b2854cba3d127042e5bd1c3f83655b42b2399a08c2374f59ab0b8473b3da8f49e42d0d10f539c5aad056fd8f7a99caaeef2ddc475fb931d3c6f6a34eed4d047e6abde1600bf30421773c8a65295316242db4f0849e3fe5a2d437c43f138475247af8dbf6467198c8b4f7531b6539b093bda836dd5942d7cb5df850aac965"}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r2, 0x10, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) 22:55:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r0}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r2, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) 22:55:45 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) 22:55:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000002f40)='net/ip6_tables_names\x00') ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000002fc0)={0x1, &(0x7f0000002f80)=[{0x0, 0x0, 0x0, @dev}]}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0xfffffffffffffffe, 0x0) r2 = add_key(&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r2) ioctl$TUNGETFILTER(r1, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r4}, 0x10) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x7, 0xffffffffffff8806, 0x3, 0xe6, 0x1, 0xfffffffffffffff8, 0x0, {0x0, @in6={{0xa, 0x4e24, 0x4, @loopback, 0x5}}, 0xffff, 0x10000, 0x5, 0x6, 0xe4d}}, &(0x7f0000000100)=0xb0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000140)={r5}, &(0x7f00000002c0)=0x8) socket$kcm(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r3, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000340)={&(0x7f0000000300)=[0x0], 0x1}) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) [ 3058.353333][T10708] device bridge_slave_1 left promiscuous mode [ 3058.359538][T10708] bridge0: port 2(bridge_slave_1) entered disabled state [ 3058.413068][T10708] device bridge_slave_0 left promiscuous mode [ 3058.419216][T10708] bridge0: port 1(bridge_slave_0) entered disabled state [ 3059.112720][T10708] device hsr_slave_0 left promiscuous mode [ 3059.182389][T10708] device hsr_slave_1 left promiscuous mode [ 3059.258617][T10708] team0 (unregistering): Port device team_slave_1 removed [ 3059.269049][T10708] team0 (unregistering): Port device team_slave_0 removed [ 3059.278439][T10708] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3059.315946][T10708] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3059.391286][T10708] bond0 (unregistering): Released all slaves [ 3059.498727][T31612] IPVS: ftp: loaded support on port[0] = 21 [ 3059.547776][T31612] chnl_net:caif_netlink_parms(): no params data found [ 3059.577621][T31612] bridge0: port 1(bridge_slave_0) entered blocking state [ 3059.584738][T31612] bridge0: port 1(bridge_slave_0) entered disabled state [ 3059.592118][T31612] device bridge_slave_0 entered promiscuous mode [ 3059.599491][T31612] bridge0: port 2(bridge_slave_1) entered blocking state [ 3059.606614][T31612] bridge0: port 2(bridge_slave_1) entered disabled state [ 3059.614352][T31612] device bridge_slave_1 entered promiscuous mode [ 3059.630000][T31612] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3059.640523][T31612] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3059.656994][T31612] team0: Port device team_slave_0 added [ 3059.663857][T31612] team0: Port device team_slave_1 added [ 3059.714629][T31612] device hsr_slave_0 entered promiscuous mode [ 3059.762822][T31612] device hsr_slave_1 entered promiscuous mode [ 3059.812371][T31612] debugfs: Directory 'hsr0' with parent '/' already present! [ 3059.860434][T31612] bridge0: port 2(bridge_slave_1) entered blocking state [ 3059.867553][T31612] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3059.874910][T31612] bridge0: port 1(bridge_slave_0) entered blocking state [ 3059.881958][T31612] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3059.927481][T31612] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3059.939951][T10691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3059.951416][T10691] bridge0: port 1(bridge_slave_0) entered disabled state [ 3059.959074][T10691] bridge0: port 2(bridge_slave_1) entered disabled state [ 3059.973996][T31612] 8021q: adding VLAN 0 to HW filter on device team0 [ 3059.984119][T14072] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3059.993947][T14072] bridge0: port 1(bridge_slave_0) entered blocking state [ 3060.000990][T14072] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3060.024668][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3060.033356][ T9644] bridge0: port 2(bridge_slave_1) entered blocking state [ 3060.040397][ T9644] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3060.048604][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3060.058837][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3060.069804][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3060.081483][T31612] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3060.096145][T31612] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3060.104838][T14072] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3060.115738][T14072] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3060.131944][T31612] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3060.256538][T31620] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 22:55:47 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) creat(0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) 22:55:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0xf5) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) 22:55:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) 22:55:47 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:47 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x28) socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) preadv(r0, &(0x7f0000001800)=[{&(0x7f00000000c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000200)=""/38, 0x26}, {&(0x7f0000000240)=""/210, 0xd2}, {&(0x7f0000000440)=""/216, 0xd8}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000340)=""/160, 0xa0}, {&(0x7f0000000580)=""/15, 0xf}, {&(0x7f0000001780)=""/117, 0x75}], 0x9, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f00000005c0), 0x4) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r3, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:47 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) 22:55:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) r3 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) symlinkat(&(0x7f0000000080)='./file0\x00', r3, &(0x7f0000000100)='./file0\x00') bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000000)=0xac, &(0x7f0000000040)=0x4) 22:55:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) r1 = socket$kcm(0x11, 0x6, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r3}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r4 = socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000080)={r1}) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x54, r6, 0x8, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffe}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x101}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x8000}, 0x4) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:48 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) 22:55:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:48 executing program 4: close(0xffffffffffffffff) r0 = socket(0x840000000002, 0x3, 0xff) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200000, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000240)='/dev/vbi#\x00', 0x2, 0x2) io_uring_register$IORING_REGISTER_EVENTFD(r1, 0x4, &(0x7f0000000280)=r2, 0x1) sendto$isdn(r0, &(0x7f0000000100)={0x6, 0x5, "6e0158384b76e5c22d15272c29f3143e233766453a6cd14897a4cb088bd8676d8e12337d4396c4b4a513b90be60d1bf9f59c7719b41465884bde3b6cc2125e5e4a4740e7e856f167531c9efe6f3adf7f066c5b8bbf8d74eb54d4148747a6b59df25cd808a4a5c246f57a81d187faa58b41a0d5f92addece12990e284e0bd25207f74a29260147376be9ca425270299b2a32946107215e0f2990e267127e7d0a899d1672881ef78e5ac36a20a5e46c5c39ee2f5ccb6f37f7a140edc18dc8ca0eb4b61d40e76baf9e95f169374a7b6ea8ba63f99d7a72b1699a778411e2517b31452f8599487505ed11e7d8c87fea333de836a"}, 0xfa, 0x4000, &(0x7f0000000000)={0x22, 0x600000000000, 0x6, 0x13, 0xffffffffffffffe1}, 0x6) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0xfffffffffffffea5) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) 22:55:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x10000, 0x0) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f00000000c0)={0x3, 0x200}) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x80103, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r3}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r2, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) [ 3061.893341][T10708] device bridge_slave_1 left promiscuous mode [ 3061.899576][T10708] bridge0: port 2(bridge_slave_1) entered disabled state [ 3061.943273][T10708] device bridge_slave_0 left promiscuous mode [ 3061.949417][T10708] bridge0: port 1(bridge_slave_0) entered disabled state [ 3062.642776][T10708] device hsr_slave_0 left promiscuous mode [ 3062.702418][T10708] device hsr_slave_1 left promiscuous mode [ 3062.768127][T10708] team0 (unregistering): Port device team_slave_1 removed [ 3062.777338][T10708] team0 (unregistering): Port device team_slave_0 removed [ 3062.787533][T10708] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3062.845977][T10708] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3062.921345][T10708] bond0 (unregistering): Released all slaves [ 3063.018686][T31976] IPVS: ftp: loaded support on port[0] = 21 [ 3063.067976][T31976] chnl_net:caif_netlink_parms(): no params data found [ 3063.089806][T31976] bridge0: port 1(bridge_slave_0) entered blocking state [ 3063.096976][T31976] bridge0: port 1(bridge_slave_0) entered disabled state [ 3063.104696][T31976] device bridge_slave_0 entered promiscuous mode [ 3063.111753][T31976] bridge0: port 2(bridge_slave_1) entered blocking state [ 3063.119172][T31976] bridge0: port 2(bridge_slave_1) entered disabled state [ 3063.126696][T31976] device bridge_slave_1 entered promiscuous mode [ 3063.145430][T31976] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3063.155716][T31976] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3063.173413][T31976] team0: Port device team_slave_0 added [ 3063.233980][T31976] team0: Port device team_slave_1 added [ 3063.304600][T31976] device hsr_slave_0 entered promiscuous mode [ 3063.343889][T31976] device hsr_slave_1 entered promiscuous mode [ 3063.412422][T31976] debugfs: Directory 'hsr0' with parent '/' already present! [ 3063.431939][T31976] bridge0: port 2(bridge_slave_1) entered blocking state [ 3063.439043][T31976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3063.446393][T31976] bridge0: port 1(bridge_slave_0) entered blocking state [ 3063.453466][T31976] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3063.480769][T31976] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3063.492508][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3063.500668][T10733] bridge0: port 1(bridge_slave_0) entered disabled state [ 3063.509458][T10733] bridge0: port 2(bridge_slave_1) entered disabled state [ 3063.521085][T31976] 8021q: adding VLAN 0 to HW filter on device team0 [ 3063.531038][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3063.539631][T10733] bridge0: port 1(bridge_slave_0) entered blocking state [ 3063.546734][T10733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3063.564974][T14882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3063.573637][T14882] bridge0: port 2(bridge_slave_1) entered blocking state [ 3063.580676][T14882] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3063.589427][T14882] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3063.603633][T31976] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3063.614303][T31976] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3063.625968][T17947] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3063.634162][T17947] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3063.642971][T17947] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3063.651092][T17947] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3063.661092][T17947] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3063.675382][T31976] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3063.800069][T31984] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3063.810378][T31984] CPU: 0 PID: 31984 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3063.818332][T31984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3063.828366][T31984] Call Trace: [ 3063.831653][T31984] dump_stack+0x1d8/0x2f8 [ 3063.836005][T31984] dump_header+0xd8/0x960 [ 3063.840309][T31984] oom_kill_process+0xcd/0x350 [ 3063.845047][T31984] out_of_memory+0x5c8/0x880 [ 3063.849612][T31984] memory_max_write+0x4ba/0x600 [ 3063.854439][T31984] ? memory_max_show+0xa0/0xa0 [ 3063.859181][T31984] cgroup_file_write+0x223/0x5f0 [ 3063.864094][T31984] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3063.869196][T31984] kernfs_fop_write+0x3e4/0x4f0 [ 3063.874038][T31984] ? kernfs_fop_read+0x580/0x580 [ 3063.878956][T31984] __vfs_write+0xb8/0x740 [ 3063.883279][T31984] ? check_preemption_disabled+0x47/0x2a0 [ 3063.888974][T31984] ? __sb_start_write+0x403/0x4c0 [ 3063.893975][T31984] vfs_write+0x275/0x590 [ 3063.898192][T31984] ksys_write+0x117/0x220 [ 3063.902498][T31984] __x64_sys_write+0x7b/0x90 [ 3063.907080][T31984] do_syscall_64+0xfe/0x140 [ 3063.911561][T31984] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3063.917424][T31984] RIP: 0033:0x459829 [ 3063.921293][T31984] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3063.940903][T31984] RSP: 002b:00007f9376c4bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3063.949313][T31984] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 3063.957258][T31984] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 3063.965226][T31984] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3063.973169][T31984] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9376c4c6d4 [ 3063.981130][T31984] R13: 00000000004c98fc R14: 00000000004e0ea8 R15: 00000000ffffffff [ 3063.997187][T31984] memory: usage 5376kB, limit 0kB, failcnt 3119964 [ 3064.003946][T31984] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3064.010825][T31984] Memory cgroup stats for /syz2: [ 3064.011013][T31984] anon 4354048 [ 3064.011013][T31984] file 143360 [ 3064.011013][T31984] kernel_stack 65536 [ 3064.011013][T31984] slab 851968 [ 3064.011013][T31984] sock 0 [ 3064.011013][T31984] shmem 0 [ 3064.011013][T31984] file_mapped 0 [ 3064.011013][T31984] file_dirty 0 [ 3064.011013][T31984] file_writeback 0 [ 3064.011013][T31984] anon_thp 4194304 [ 3064.011013][T31984] inactive_anon 0 [ 3064.011013][T31984] active_anon 4354048 [ 3064.011013][T31984] inactive_file 0 [ 3064.011013][T31984] active_file 0 [ 3064.011013][T31984] unevictable 0 [ 3064.011013][T31984] slab_reclaimable 270336 [ 3064.011013][T31984] slab_unreclaimable 581632 [ 3064.011013][T31984] pgfault 209154 [ 3064.011013][T31984] pgmajfault 0 [ 3064.011013][T31984] workingset_refault 0 [ 3064.011013][T31984] workingset_activate 0 [ 3064.011013][T31984] workingset_nodereclaim 0 [ 3064.011013][T31984] pgrefill 0 [ 3064.011013][T31984] pgscan 2083 [ 3064.011013][T31984] pgsteal 2083 [ 3064.011013][T31984] pgactivate 0 [ 3064.106752][T31984] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=31983,uid=0 [ 3064.122928][T31984] Memory cgroup out of memory: Killed process 31983 (syz-executor.2) total-vm:72712kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB [ 3064.138929][ T1058] oom_reaper: reaped process 31983 (syz-executor.2), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB 22:55:51 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:51 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) 22:55:51 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) sendfile(r1, r5, 0x0, 0x87ff7) 22:55:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) poll(&(0x7f0000000000)=[{r0, 0x2004}, {r0, 0x1000}, {r0, 0x1}], 0x3, 0x3) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) 22:55:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x8, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x40, 0x0) ioctl$sock_x25_SIOCDELRT(r3, 0x890c, &(0x7f0000000200)={@null=' \x00', 0x6, 'bpq0\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000), 0x43578cf5) tkill(0x0, 0x9) [ 3064.171756][T31976] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 3064.209380][T32008] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 3064.263096][T31976] CPU: 1 PID: 31976 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3064.271095][T31976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3064.281150][T31976] Call Trace: [ 3064.284439][T31976] dump_stack+0x1d8/0x2f8 [ 3064.288776][T31976] dump_header+0xd8/0x960 [ 3064.293101][T31976] oom_kill_process+0xcd/0x350 [ 3064.297862][T31976] out_of_memory+0x5c8/0x880 [ 3064.302449][T31976] try_charge+0x125a/0x1910 [ 3064.306992][T31976] mem_cgroup_try_charge+0x20c/0x680 [ 3064.312280][T31976] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3064.312294][T31976] handle_mm_fault+0x312f/0x6010 [ 3064.312321][T31976] do_user_addr_fault+0x589/0xaf0 [ 3064.312340][T31976] __do_page_fault+0xd3/0x1f0 [ 3064.312354][T31976] do_page_fault+0x99/0xb0 [ 3064.322896][T31976] page_fault+0x39/0x40 [ 3064.322905][T31976] RIP: 0033:0x4034f2 22:55:51 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video37\x00', 0x2, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x6, 0xf8000000000000, 0x1, 0x4, 0x2, 0x9, 0x3b6, {0x0, @in6={{0xa, 0x4e24, 0x99e, @remote, 0x20}}, 0x5, 0x1000, 0x2, 0x1, 0xb9}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000200)={r3, 0xe75800000000, 0x30}, &(0x7f0000000240)=0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0x7, 0x400880) ioctl$TCSETSF(r4, 0x5404, &(0x7f00000002c0)={0x4, 0x8001, 0x8, 0x81, 0x1a, 0x9, 0x6, 0x6, 0x5, 0x9, 0x100, 0x9}) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r4, 0x0, 0x18f) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:51 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) 22:55:51 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000480)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000300)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={r1, @in={{0x2, 0x4e20, @local}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000440)={r3, 0x31}) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) [ 3064.322915][T31976] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 59 8d 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 79 42 05 00 48 [ 3064.322921][T31976] RSP: 002b:00007ffded8efe70 EFLAGS: 00010246 [ 3064.322930][T31976] RAX: 0000000000000000 RBX: 00000000002ebfe8 RCX: 0000000000413430 [ 3064.322935][T31976] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffded8f0fa0 [ 3064.322941][T31976] RBP: 0000000000000002 R08: 0000000000000001 R09: 000055555736d940 [ 3064.322953][T31976] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffded8f0fa0 [ 3064.403210][T31976] R13: 00007ffded8f0f90 R14: 0000000000000000 R15: 00007ffded8f0fa0 22:55:51 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000440)='memory.yax\x00\xe5\xc6Z\xe6\xd8\'\xaa\xc8\x1cc\xa2\xe0\xd7\x03\\\xdb\x1c\x81s\xd3[\xe6\x00\x10\xaeL', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r0, 0x0, 0xb, &(0x7f0000000100)='memory.max\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=r5, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r3, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$KVM_GET_MSR_INDEX_LIST(r6, 0xc004ae02, &(0x7f00000000c0)={0x4, [0x0, 0x0, 0x0, 0x0]}) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000740)) [ 3064.492456][T31976] memory: usage 996kB, limit 0kB, failcnt 3119973 [ 3064.510703][T31976] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3064.543519][T31976] Memory cgroup stats for /syz2: [ 3064.543603][T31976] anon 65536 [ 3064.543603][T31976] file 143360 [ 3064.543603][T31976] kernel_stack 0 [ 3064.543603][T31976] slab 851968 [ 3064.543603][T31976] sock 0 [ 3064.543603][T31976] shmem 0 [ 3064.543603][T31976] file_mapped 0 [ 3064.543603][T31976] file_dirty 0 [ 3064.543603][T31976] file_writeback 0 [ 3064.543603][T31976] anon_thp 0 [ 3064.543603][T31976] inactive_anon 0 [ 3064.543603][T31976] active_anon 65536 [ 3064.543603][T31976] inactive_file 0 [ 3064.543603][T31976] active_file 0 22:55:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r3, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x20000, 0x2000000000000000) r5 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r5, 0x400454d4, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x87ff7) [ 3064.543603][T31976] unevictable 0 [ 3064.543603][T31976] slab_reclaimable 270336 [ 3064.543603][T31976] slab_unreclaimable 581632 [ 3064.543603][T31976] pgfault 209154 [ 3064.543603][T31976] pgmajfault 0 [ 3064.543603][T31976] workingset_refault 0 [ 3064.543603][T31976] workingset_activate 0 [ 3064.543603][T31976] workingset_nodereclaim 0 [ 3064.543603][T31976] pgrefill 0 [ 3064.543603][T31976] pgscan 2083 [ 3064.543603][T31976] pgsteal 2083 [ 3064.543603][T31976] pgactivate 0 22:55:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) [ 3064.645255][T31976] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=31976,uid=0 [ 3064.661545][T31976] Memory cgroup out of memory: Killed process 31976 (syz-executor.2) total-vm:72448kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB [ 3064.678331][ T1058] oom_reaper: reaped process 31976 (syz-executor.2), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 22:55:52 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000000)={'ifb0\x00', {0x2, 0x4e21, @multicast1}}) 22:55:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0xc0, r4, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x78, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffffc0}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7a}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1c0000000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x79a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x14000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x24000000}, 0x8000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x13, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r3, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x20000, 0x2000000000000000) r5 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r5, 0x400454d4, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x87ff7) 22:55:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0xe, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0xc, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={0x0, r0}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r2, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:52 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r0, 0x80000) close(r0) socket(0x840000000002, 0x3, 0xfd) getsockname(r0, &(0x7f0000000000)=@alg, &(0x7f0000000100)=0x80) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000032006c05000000000000000164100511660100000038000000000000000900000b00"/56], 0x9e) 22:55:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r3, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x20000, 0x2000000000000000) r5 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r5, 0x400454d4, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x87ff7) 22:55:52 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r3, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x20000, 0x2000000000000000) r5 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r5, 0x400454d4, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x87ff7) 22:55:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r3 = socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r3, 0x80045400, &(0x7f0000000080)) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:52 executing program 0 (fault-call:4 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) r3 = gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r4 = socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000080)=r3) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0x101) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="4ef27f45294600000032096c050000000000000001f357c964100511660100000038000000000000006c00006f738273f580a0d1c3c4fb7161e048d40e50ea5121379c2ccbeae4d2c1e42c679dab3aa7ebc46fb87eecf676361a188c7a1b16001000005295bb4630887dbeb3a63deca154d80434b5fa0d11452962fd7517834cdb64683e2240d66e6516b8e2dac70ff4e11552975402005a3d6a36c29970eb60437d80766bb3a046611970a8689fe7b5b6ce8808"], 0x9e) 22:55:53 executing program 5 (fault-call:7 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) 22:55:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0xfffffffffffffe75) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() setsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000080)=0x728b27ec, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) [ 3065.834421][T32586] FAULT_INJECTION: forcing a failure. [ 3065.834421][T32586] name fail_futex, interval 1, probability 0, space 0, times 1 [ 3065.895769][T32586] CPU: 1 PID: 32586 Comm: syz-executor.5 Not tainted 5.3.0-rc2+ #63 [ 3065.903769][T32586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3065.903774][T32586] Call Trace: [ 3065.903791][T32586] dump_stack+0x1d8/0x2f8 [ 3065.903806][T32586] should_fail+0x555/0x770 [ 3065.903881][T32586] get_futex_key+0x19a/0x1660 [ 3065.903900][T32586] futex_wake+0xba/0x820 [ 3065.934908][T32586] ? process_measurement+0x623/0x16c0 [ 3065.940278][T32586] ? debug_smp_processor_id+0x1c/0x20 [ 3065.945650][T32586] do_futex+0x405/0x3e00 [ 3065.949893][T32586] ? debug_smp_processor_id+0x1c/0x20 [ 3065.955255][T32586] ? perf_trace_lock+0x90/0x360 [ 3065.960105][T32586] ? check_preemption_disabled+0x47/0x2a0 [ 3065.965825][T32586] ? __might_fault+0xf9/0x160 [ 3065.970490][T32586] ? debug_smp_processor_id+0x1c/0x20 [ 3065.975853][T32586] ? perf_trace_lock+0x90/0x360 [ 3065.980710][T32586] ? __might_fault+0xf9/0x160 [ 3065.985385][T32586] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 3065.991275][T32586] ? __might_fault+0xf9/0x160 [ 3065.995943][T32586] ? __might_fault+0xf9/0x160 [ 3066.000626][T32586] ? trace_lock_release+0x135/0x1a0 [ 3066.005815][T32586] ? __might_fault+0xf9/0x160 [ 3066.010495][T32586] mm_release+0x209/0x390 [ 3066.014816][T32586] exit_mm+0x67/0x590 [ 3066.018843][T32586] ? taskstats_exit+0x465/0xba0 [ 3066.023692][T32586] ? acct_collect+0x4c4/0x5f0 [ 3066.028400][T32586] do_exit+0x565/0x21a0 [ 3066.032567][T32586] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 3066.038449][T32586] ? get_signal+0x3aa/0x1d60 [ 3066.043046][T32586] ? get_signal+0x3aa/0x1d60 [ 3066.047632][T32586] do_group_exit+0x15c/0x2b0 [ 3066.052210][T32586] get_signal+0x4ac/0x1d60 [ 3066.056671][T32586] ? trace_lock_release+0x135/0x1a0 [ 3066.061925][T32586] ? rcu_lock_release+0x9/0x30 [ 3066.066720][T32586] do_signal+0x37/0x640 [ 3066.070870][T32586] ? prepare_exit_to_usermode+0x258/0x580 [ 3066.076583][T32586] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 3066.082210][T32586] prepare_exit_to_usermode+0x303/0x580 [ 3066.087757][T32586] syscall_return_slowpath+0x113/0x4a0 [ 3066.093201][T32586] do_syscall_64+0x126/0x140 [ 3066.097780][T32586] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3066.103652][T32586] RIP: 0033:0x459829 [ 3066.107528][T32586] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3066.127118][T32586] RSP: 002b:00007fbcfa12bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000c8 [ 3066.135511][T32586] RAX: 0000000000000000 RBX: 00007fbcfa12bc90 RCX: 0000000000459829 [ 3066.143472][T32586] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 0000000000000016 [ 3066.151426][T32586] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 3066.159386][T32586] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbcfa12c6d4 [ 3066.167340][T32586] R13: 00000000004c8f1d R14: 00000000004dff60 R15: 0000000000000007 [ 3066.782868][T10699] device bridge_slave_1 left promiscuous mode [ 3066.789007][T10699] bridge0: port 2(bridge_slave_1) entered disabled state [ 3066.853132][T10699] device bridge_slave_0 left promiscuous mode [ 3066.859265][T10699] bridge0: port 1(bridge_slave_0) entered disabled state [ 3067.572755][T10699] device hsr_slave_0 left promiscuous mode [ 3067.642348][T10699] device hsr_slave_1 left promiscuous mode [ 3067.686738][T10699] team0 (unregistering): Port device team_slave_1 removed [ 3067.697348][T10699] team0 (unregistering): Port device team_slave_0 removed [ 3067.707037][T10699] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3067.746422][T10699] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3067.811200][T10699] bond0 (unregistering): Released all slaves [ 3067.937365][T32591] IPVS: ftp: loaded support on port[0] = 21 [ 3067.981603][T32591] chnl_net:caif_netlink_parms(): no params data found [ 3068.015976][T32591] bridge0: port 1(bridge_slave_0) entered blocking state [ 3068.023145][T32591] bridge0: port 1(bridge_slave_0) entered disabled state [ 3068.030622][T32591] device bridge_slave_0 entered promiscuous mode [ 3068.038001][T32591] bridge0: port 2(bridge_slave_1) entered blocking state [ 3068.045130][T32591] bridge0: port 2(bridge_slave_1) entered disabled state [ 3068.052778][T32591] device bridge_slave_1 entered promiscuous mode [ 3068.068908][T32591] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3068.080229][T32591] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3068.099009][T32591] team0: Port device team_slave_0 added [ 3068.105475][T32591] team0: Port device team_slave_1 added [ 3068.164617][T32591] device hsr_slave_0 entered promiscuous mode [ 3068.222550][T32591] device hsr_slave_1 entered promiscuous mode [ 3068.272360][T32591] debugfs: Directory 'hsr0' with parent '/' already present! [ 3068.320348][T32591] bridge0: port 2(bridge_slave_1) entered blocking state [ 3068.327523][T32591] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3068.334863][T32591] bridge0: port 1(bridge_slave_0) entered blocking state [ 3068.341928][T32591] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3068.387434][T32591] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3068.399682][T10691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3068.411274][T10691] bridge0: port 1(bridge_slave_0) entered disabled state [ 3068.419786][T10691] bridge0: port 2(bridge_slave_1) entered disabled state [ 3068.434205][T32591] 8021q: adding VLAN 0 to HW filter on device team0 [ 3068.445259][T14072] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3068.453774][T14072] bridge0: port 1(bridge_slave_0) entered blocking state [ 3068.460812][T14072] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3068.484488][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3068.493302][ T9644] bridge0: port 2(bridge_slave_1) entered blocking state [ 3068.501881][ T9644] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3068.514778][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3068.526520][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3068.535324][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3068.547150][T32591] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3068.558575][T32591] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3068.568210][T14072] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3068.578630][T14072] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3068.600787][T32591] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3068.764354][T32599] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3068.776305][T32599] CPU: 1 PID: 32599 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3068.784284][T32599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3068.794325][T32599] Call Trace: [ 3068.797590][T32599] dump_stack+0x1d8/0x2f8 [ 3068.801894][T32599] dump_header+0xd8/0x960 [ 3068.806196][T32599] oom_kill_process+0xcd/0x350 [ 3068.810945][T32599] out_of_memory+0x5c8/0x880 [ 3068.815510][T32599] memory_max_write+0x4ba/0x600 [ 3068.820332][T32599] ? memory_max_show+0xa0/0xa0 [ 3068.825065][T32599] cgroup_file_write+0x223/0x5f0 [ 3068.829975][T32599] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3068.835057][T32599] kernfs_fop_write+0x3e4/0x4f0 [ 3068.839876][T32599] ? kernfs_fop_read+0x580/0x580 [ 3068.844797][T32599] __vfs_write+0xb8/0x740 [ 3068.849099][T32599] ? check_preemption_disabled+0x47/0x2a0 [ 3068.854791][T32599] ? __sb_start_write+0x403/0x4c0 [ 3068.859802][T32599] vfs_write+0x275/0x590 [ 3068.864034][T32599] ksys_write+0x117/0x220 [ 3068.868335][T32599] __x64_sys_write+0x7b/0x90 [ 3068.872913][T32599] do_syscall_64+0xfe/0x140 [ 3068.877404][T32599] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3068.883268][T32599] RIP: 0033:0x459829 [ 3068.887134][T32599] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3068.906916][T32599] RSP: 002b:00007f6724262c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3068.915320][T32599] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 3068.923266][T32599] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 3068.931215][T32599] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3068.939157][T32599] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f67242636d4 [ 3068.947101][T32599] R13: 00000000004c98fc R14: 00000000004e0ea8 R15: 00000000ffffffff [ 3068.965868][T32599] memory: usage 5404kB, limit 0kB, failcnt 3119982 [ 3068.972765][T32599] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3068.979650][T32599] Memory cgroup stats for /syz2: [ 3068.980276][T32599] anon 4317184 [ 3068.980276][T32599] file 143360 [ 3068.980276][T32599] kernel_stack 0 [ 3068.980276][T32599] slab 851968 [ 3068.980276][T32599] sock 0 [ 3068.980276][T32599] shmem 0 [ 3068.980276][T32599] file_mapped 0 [ 3068.980276][T32599] file_dirty 0 [ 3068.980276][T32599] file_writeback 0 [ 3068.980276][T32599] anon_thp 4194304 [ 3068.980276][T32599] inactive_anon 0 [ 3068.980276][T32599] active_anon 4317184 [ 3068.980276][T32599] inactive_file 0 [ 3068.980276][T32599] active_file 0 [ 3068.980276][T32599] unevictable 0 [ 3068.980276][T32599] slab_reclaimable 270336 [ 3068.980276][T32599] slab_unreclaimable 581632 [ 3068.980276][T32599] pgfault 209253 [ 3068.980276][T32599] pgmajfault 0 [ 3068.980276][T32599] workingset_refault 0 [ 3068.980276][T32599] workingset_activate 0 [ 3068.980276][T32599] workingset_nodereclaim 0 [ 3068.980276][T32599] pgrefill 0 [ 3068.980276][T32599] pgscan 2083 [ 3068.980276][T32599] pgsteal 2083 [ 3068.980276][T32599] pgactivate 0 [ 3069.077663][T32599] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=32598,uid=0 [ 3069.094704][T32599] Memory cgroup out of memory: Killed process 32598 (syz-executor.2) total-vm:72712kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB 22:55:56 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:56 executing program 4 (fault-call:7 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r1) tkill(r1, 0x9) 22:55:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x2, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:56 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = dup3(r0, r0, 0x80000) accept4(r1, &(0x7f0000000080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x80, 0x80000) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r3, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000740)) 22:55:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) 22:55:56 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) [ 3069.112902][ T1058] oom_reaper: reaped process 32598 (syz-executor.2), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 3069.150614][T32591] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 3069.169491][T32591] CPU: 0 PID: 32591 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3069.177483][T32591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3069.187528][T32591] Call Trace: [ 3069.190812][T32591] dump_stack+0x1d8/0x2f8 [ 3069.195151][T32591] dump_header+0xd8/0x960 [ 3069.199467][T32591] oom_kill_process+0xcd/0x350 [ 3069.204213][T32591] out_of_memory+0x5c8/0x880 [ 3069.208805][T32591] try_charge+0x125a/0x1910 [ 3069.213301][T32591] mem_cgroup_try_charge+0x20c/0x680 [ 3069.218573][T32591] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3069.224188][T32591] wp_page_copy+0x35c/0x1980 [ 3069.228759][T32591] ? trace_lock_release+0x135/0x1a0 [ 3069.233936][T32591] ? do_wp_page+0x27f/0x1cc0 [ 3069.238522][T32591] ? __kasan_check_read+0x11/0x20 [ 3069.243525][T32591] ? do_raw_spin_unlock+0x49/0x260 [ 3069.248625][T32591] do_wp_page+0x5e5/0x1cc0 [ 3069.253020][T32591] ? __kasan_check_write+0x14/0x20 [ 3069.258117][T32591] handle_mm_fault+0x2adf/0x6010 [ 3069.263049][T32591] do_user_addr_fault+0x589/0xaf0 [ 3069.268094][T32591] __do_page_fault+0xd3/0x1f0 [ 3069.272762][T32591] do_page_fault+0x99/0xb0 [ 3069.277160][T32591] page_fault+0x39/0x40 [ 3069.281297][T32591] RIP: 0033:0x430906 [ 3069.285170][T32591] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 5c 46 64 00 85 c0 0f 84 [ 3069.304756][T32591] RSP: 002b:00007ffd8f2872e0 EFLAGS: 00010206 [ 3069.310799][T32591] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 3069.318751][T32591] RDX: 00005555570ab930 RSI: 00005555570b3970 RDI: 0000000000000003 [ 3069.326712][T32591] RBP: 0000000000008041 R08: 0000000000000001 R09: 00005555570aa940 [ 3069.334674][T32591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 3069.342622][T32591] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 3069.353744][T32591] memory: usage 1016kB, limit 0kB, failcnt 3119991 [ 3069.362900][T32591] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3069.370021][T32591] Memory cgroup stats for /syz2: [ 3069.371553][T32591] anon 73728 [ 3069.371553][T32591] file 143360 [ 3069.371553][T32591] kernel_stack 0 [ 3069.371553][T32591] slab 851968 [ 3069.371553][T32591] sock 0 [ 3069.371553][T32591] shmem 0 [ 3069.371553][T32591] file_mapped 0 [ 3069.371553][T32591] file_dirty 0 [ 3069.371553][T32591] file_writeback 0 [ 3069.371553][T32591] anon_thp 0 [ 3069.371553][T32591] inactive_anon 0 [ 3069.371553][T32591] active_anon 73728 [ 3069.371553][T32591] inactive_file 0 [ 3069.371553][T32591] active_file 0 [ 3069.371553][T32591] unevictable 0 [ 3069.371553][T32591] slab_reclaimable 270336 [ 3069.371553][T32591] slab_unreclaimable 581632 [ 3069.371553][T32591] pgfault 209253 [ 3069.371553][T32591] pgmajfault 0 [ 3069.371553][T32591] workingset_refault 0 [ 3069.371553][T32591] workingset_activate 0 [ 3069.371553][T32591] workingset_nodereclaim 0 [ 3069.371553][T32591] pgrefill 0 [ 3069.371553][T32591] pgscan 2083 [ 3069.371553][T32591] pgsteal 2083 [ 3069.371553][T32591] pgactivate 0 [ 3069.467710][T32591] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=32591,uid=0 [ 3069.484695][T32591] Memory cgroup out of memory: Killed process 32591 (syz-executor.2) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB 22:55:57 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000080)={0x80000000, 0xe51a, 0x2}) socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x55) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000440)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r4}, 0x10) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000100)={'nat\x00', 0x3, "faa92d"}, &(0x7f0000000140)=0x27) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x2}, 0x148) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f00000003c0)) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000200)={0x9, {{0x2, 0x4e22, @local}}, 0x1, 0x2, [{{0x2, 0x4e24, @rand_addr=0x5f1d}}, {{0x2, 0x4e23, @loopback}}]}, 0x190) write$cgroup_int(r3, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000740)) 22:55:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_raw(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x1d, r4}, 0x10, &(0x7f0000000180)={&(0x7f0000000100)=@canfd={{0x0, 0x0, 0x2f, 0x8}, 0x28, 0x3, 0x0, 0x0, "e1f8e7509c682bddf044263084491a2be61cc982532fa76b3698e74a55c7ee96e4e3ab90e66395113117788ecdd2197fd33c191e2aa3571d9b265b9d46932280"}, 0x48}, 0x1, 0x0, 0x0, 0x8011}, 0x80) [ 3069.549001][ T1058] oom_reaper: reaped process 32591 (syz-executor.2), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 22:55:57 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) 22:55:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r1) tkill(r1, 0x9) 22:55:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x3, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x4, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:57 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x0, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) r1 = socket$kcm(0x11, 0x6, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r3}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) setfsgid(r4) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000100)=0x1, 0x4) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r2, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000140)) 22:55:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5, 0x400) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x20) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) bind$nfc_llcp(r0, &(0x7f0000000200)={0x27, 0x0, 0x1, 0x1, 0x2, 0x1, "834435c1d6b79439abb132bf41b39b21a49353df6cdab60370d0c45ae850afdc65bf15ff109f13bc08acb9c49dd4499753221d8e6393fa55dd616b926936f2", 0x4}, 0x60) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) r2 = gettid() ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) ioctl$TIOCSTI(r1, 0x5412, 0x248) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r2) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r5, 0x400, 0x70bd28, 0x25dfdbfe, {}, ["", ""]}, 0x1c}}, 0x40044) tkill(r2, 0x9) 22:55:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x5, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:57 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) 22:55:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0xa80, 0x0) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f00000000c0)={0x80000001, 0x5, 0x2, "4d156315eba94869b194e1cac1ab4f5bafe04d8fdebd71346030baebd139970a", 0x32314d54}) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000200)=0x81) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$swradio(&(0x7f0000000380)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000003c0)={0x0, 0x9, 0x9, 0x3}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000440)={r3, @in={{0x2, 0x4e21, @loopback}}, 0x3, 0x3fffffff80000, 0x800000000003ff, 0x2020, 0x9}, 0x98) wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$rds(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000240)=""/23, 0x17}, {&(0x7f0000000280)=""/216, 0xd8}, {&(0x7f0000000500)=""/61, 0x3d}, {&(0x7f0000000540)}], 0x4, 0x0, 0x0, 0x40004}, 0x840) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0xc766bba03e7266c, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r1, 0x10f, 0x86) openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x0, 0x0) rt_sigqueueinfo(0x0, 0x5, &(0x7f0000000100)={0x23, 0x2, 0x400000000}) pipe(&(0x7f00000001c0)) write(r2, &(0x7f0000000000), 0x0) tkill(0x0, 0x9) 22:55:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000003, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0xf) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x4}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000001c0)={r4, 0xf46}, &(0x7f0000000200)=0x8) getpeername$unix(r2, &(0x7f00000000c0)=@abs, &(0x7f0000000000)=0x6e) 22:55:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x6, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x8, 0x20, 0x3}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000140)={r2, 0x6}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r3 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r3) tkill(r3, 0x9) 22:55:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x541000, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000000c0)={0x8, 0x4, 0x3, 'queue1\x00', 0xffffffffffff8001}) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:57 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x0, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:55:57 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) 22:55:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x7, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r1) tkill(r1, 0x9) 22:55:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) r1 = socket$kcm(0x11, 0x6, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r3}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) fcntl$addseals(r1, 0x409, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r2, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x8, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000000)) write(r3, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) 22:55:58 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) 22:55:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80000, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) r2 = gettid() pipe(&(0x7f0000000040)) ptrace(0x4206, r2) socket$vsock_stream(0x28, 0x1, 0x0) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x3, 0x40202) tkill(r2, 0x1) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000000)={0x80000000, 0x0, @name="31f105bd9af1c7192eccd8fa1eba5fd55fd20161a95580ec7d37975704fa3069"}) 22:55:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:55:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x9, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:55:58 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self\x00', 0x2000, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={r3, 0x40, 0x1000001}, 0xffffffdd) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) [ 3071.553067][ T9909] device bridge_slave_1 left promiscuous mode [ 3071.559211][ T9909] bridge0: port 2(bridge_slave_1) entered disabled state [ 3071.613073][ T9909] device bridge_slave_0 left promiscuous mode [ 3071.619191][ T9909] bridge0: port 1(bridge_slave_0) entered disabled state [ 3072.312891][ T9909] device hsr_slave_0 left promiscuous mode [ 3072.352454][ T9909] device hsr_slave_1 left promiscuous mode [ 3072.397698][ T9909] team0 (unregistering): Port device team_slave_1 removed [ 3072.407133][ T9909] team0 (unregistering): Port device team_slave_0 removed [ 3072.418007][ T9909] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3072.445588][ T9909] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3072.514275][ T9909] bond0 (unregistering): Released all slaves [ 3072.618344][ T861] IPVS: ftp: loaded support on port[0] = 21 [ 3072.666292][ T861] chnl_net:caif_netlink_parms(): no params data found [ 3072.693496][ T861] bridge0: port 1(bridge_slave_0) entered blocking state [ 3072.700587][ T861] bridge0: port 1(bridge_slave_0) entered disabled state [ 3072.708124][ T861] device bridge_slave_0 entered promiscuous mode [ 3072.716004][ T861] bridge0: port 2(bridge_slave_1) entered blocking state [ 3072.723151][ T861] bridge0: port 2(bridge_slave_1) entered disabled state [ 3072.730644][ T861] device bridge_slave_1 entered promiscuous mode [ 3072.746587][ T861] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3072.756994][ T861] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3072.775734][ T861] team0: Port device team_slave_0 added [ 3072.782213][ T861] team0: Port device team_slave_1 added [ 3072.844346][ T861] device hsr_slave_0 entered promiscuous mode [ 3072.882646][ T861] device hsr_slave_1 entered promiscuous mode [ 3072.922354][ T861] debugfs: Directory 'hsr0' with parent '/' already present! [ 3072.971011][ T861] bridge0: port 2(bridge_slave_1) entered blocking state [ 3072.978121][ T861] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3072.985463][ T861] bridge0: port 1(bridge_slave_0) entered blocking state [ 3072.992542][ T861] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3073.036705][ T861] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3073.049827][T32240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3073.060617][T32240] bridge0: port 1(bridge_slave_0) entered disabled state [ 3073.069130][T32240] bridge0: port 2(bridge_slave_1) entered disabled state [ 3073.083828][ T861] 8021q: adding VLAN 0 to HW filter on device team0 [ 3073.094428][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3073.103254][ T9644] bridge0: port 1(bridge_slave_0) entered blocking state [ 3073.110292][ T9644] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3073.134604][T14072] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3073.143602][T14072] bridge0: port 2(bridge_slave_1) entered blocking state [ 3073.150651][T14072] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3073.159314][T14072] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3073.169142][T14072] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3073.178235][T14072] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3073.189683][ T861] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3073.200979][ T861] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3073.209825][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3073.217856][ T9644] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3073.236201][ T861] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3073.413167][ T870] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3073.423624][ T870] CPU: 0 PID: 870 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3073.431409][ T870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3073.441437][ T870] Call Trace: [ 3073.444742][ T870] dump_stack+0x1d8/0x2f8 [ 3073.449073][ T870] dump_header+0xd8/0x960 [ 3073.453484][ T870] oom_kill_process+0xcd/0x350 [ 3073.458268][ T870] out_of_memory+0x5c8/0x880 [ 3073.462874][ T870] memory_max_write+0x4ba/0x600 [ 3073.467731][ T870] ? memory_max_show+0xa0/0xa0 [ 3073.472510][ T870] cgroup_file_write+0x223/0x5f0 [ 3073.477439][ T870] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3073.482554][ T870] kernfs_fop_write+0x3e4/0x4f0 [ 3073.487378][ T870] ? kernfs_fop_read+0x580/0x580 [ 3073.492296][ T870] __vfs_write+0xb8/0x740 [ 3073.496615][ T870] ? check_preemption_disabled+0x47/0x2a0 [ 3073.502319][ T870] ? __sb_start_write+0x403/0x4c0 [ 3073.507340][ T870] vfs_write+0x275/0x590 [ 3073.511595][ T870] ksys_write+0x117/0x220 [ 3073.515909][ T870] __x64_sys_write+0x7b/0x90 [ 3073.520489][ T870] do_syscall_64+0xfe/0x140 [ 3073.524986][ T870] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3073.530866][ T870] RIP: 0033:0x459829 [ 3073.534754][ T870] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3073.554348][ T870] RSP: 002b:00007f22eb066c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3073.562750][ T870] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 3073.570692][ T870] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 3073.578635][ T870] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 3073.586582][ T870] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f22eb0676d4 [ 3073.594530][ T870] R13: 00000000004c98fc R14: 00000000004e0ea8 R15: 00000000ffffffff [ 3073.603043][ T870] memory: usage 5456kB, limit 0kB, failcnt 3120012 [ 3073.609554][ T870] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3073.616437][ T870] Memory cgroup stats for /syz2: [ 3073.616541][ T870] anon 4370432 [ 3073.616541][ T870] file 143360 [ 3073.616541][ T870] kernel_stack 131072 [ 3073.616541][ T870] slab 851968 [ 3073.616541][ T870] sock 0 [ 3073.616541][ T870] shmem 0 [ 3073.616541][ T870] file_mapped 0 [ 3073.616541][ T870] file_dirty 0 [ 3073.616541][ T870] file_writeback 0 [ 3073.616541][ T870] anon_thp 4194304 [ 3073.616541][ T870] inactive_anon 0 [ 3073.616541][ T870] active_anon 4370432 [ 3073.616541][ T870] inactive_file 0 [ 3073.616541][ T870] active_file 0 [ 3073.616541][ T870] unevictable 0 [ 3073.616541][ T870] slab_reclaimable 270336 [ 3073.616541][ T870] slab_unreclaimable 581632 [ 3073.616541][ T870] pgfault 209319 [ 3073.616541][ T870] pgmajfault 0 [ 3073.616541][ T870] workingset_refault 0 [ 3073.616541][ T870] workingset_activate 0 [ 3073.616541][ T870] workingset_nodereclaim 0 [ 3073.616541][ T870] pgrefill 0 [ 3073.616541][ T870] pgscan 2083 [ 3073.616541][ T870] pgsteal 2083 [ 3073.616541][ T870] pgactivate 0 [ 3073.711326][ T870] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=868,uid=0 [ 3073.726627][ T870] Memory cgroup out of memory: Killed process 868 (syz-executor.2) total-vm:72844kB, anon-rss:4192kB, file-rss:34816kB, shmem-rss:0kB [ 3073.741859][ T1058] oom_reaper: reaped process 868 (syz-executor.2), now anon-rss:0kB, file-rss:33856kB, shmem-rss:0kB 22:56:01 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x0, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:56:01 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) 22:56:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0xffff, 0x1, 0x20, 0x1, 0x0, 0x2, 0x0, 0x4, 0x4, 0x80000000, 0x5, 0x1ff, 0x6, 0x7, 0x4c7, 0x3, 0xffffffff, 0x7fff, 0x3f, 0x100, 0x3, 0x7, 0x2, 0x2, 0x2, 0x1, 0x7816, 0x408, 0xfffffffffffffffc, 0xdd1, 0xfffffffffffffffb, 0x3, 0x7b2, 0x40000000000, 0xe3e, 0x8001, 0x0, 0x3, 0x4, @perf_config_ext={0x5, 0x4}, 0x2122, 0x9, 0xfff, 0xf, 0x2, 0x2, 0x100}, r1, 0xf, 0xffffffffffffffff, 0x8) write(r2, &(0x7f0000000140)="f1afff3a398992b6c8b7807579a42718d44f061f0766512e9cccfc2548df4fff6e353b64fb2d0a9e5c8f6dbfecff0148ecdf520d51d45a7afca00f7252a406257c014ff762abd8febb493cb72d730bcc869ccfb26b017e68483b46ed73736b85f5730f89999e27f401766f9de83685d9b82d0f876009256ed266c89086759985175d10c57423648b4e8edcad086956d46a52d6d73c52a9f63233f4472d2c4308122c7711de24cd221c591267ed76b156da3334772d5f1b3c87c5a26ecc6eecda4a31e4724f82570f8fc3", 0x59) tkill(r1, 0x9) 22:56:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) syz_emit_ethernet(0x50b, &(0x7f00000000c0)={@remote, @remote, [], {@mpls_uc={0x8847, {[{0x0, 0x0, 0x9}, {0x7f, 0x0, 0x1}, {0x7, 0x0, 0x1000}, {0x1, 0x0, 0x7}, {0x40, 0x0, 0x3}, {0x9, 0x0, 0x2}], @ipv6={0x9, 0x6, "bbfd23", 0x4bd, 0x6f, 0x7, @dev={0xfe, 0x80, [], 0xc}, @loopback, {[@hopopts={0x3e, 0x0, [], [@enc_lim={0x4, 0x1, 0x100000000}, @enc_lim={0x4, 0x1, 0x100000001}]}, @dstopts={0x33, 0x19, [], [@generic={0x77, 0x9a, "67e34e4221f9d881a99d6a4b0855e88431dcf8a9af02d0dcc7b04787ece61f64f93c71477087c29eaf3f8ace93ecaff22cc24b6694313bde48f66ff3fe178cfd28c5b8e1b7858ed0ea56b4808c2425b69993b195d0589e2826228bda2911d0bedcfd48cf1b90eecfdd1ed5f8fe0382917f4efb8eb242fb9fcaa22da93e488ef11c01d8a7ba5ae02827631b20010e141bf1e3253363d85f1d1fca"}, @enc_lim={0x4, 0x1, 0x400}, @hao={0xc9, 0x10, @remote}, @ra={0x5, 0x2, 0x7f}, @enc_lim={0x4, 0x1, 0x140}, @pad1, @jumbo={0xc2, 0x4, 0xfffffffffffffe01}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}]}, @hopopts={0x2b, 0x7, [], [@jumbo, @enc_lim={0x4, 0x1, 0x3}, @ra, @ra={0x5, 0x2, 0x10000}, @pad1, @calipso={0x7, 0x28, {0x7f23, 0x8, 0x5c, 0x8, [0x7, 0x1000, 0x5, 0x6c46]}}]}, @fragment={0xff, 0x0, 0x401, 0xb7, 0x0, 0x6, 0x64}, @hopopts={0x3c, 0x1, [], [@enc_lim={0x4, 0x1, 0x9}, @pad1, @jumbo={0xc2, 0x4, 0xffffffffffff7fff}]}, @hopopts={0xaf, 0x3e, [], [@generic={0xfffffffffffff001, 0x60, "0936fd02554553d018eda67d46a45fef1de6d5e4861ef175d4fa1139eb0cf6d85c9bfc9e125ceaa40e6faffdef64cb491a8e7a6f00c6d4f6819ca5a1d1356db2d989da2d646bd7d165e956aa1d3af36bde5676f70546cea1f16aefc5a94ce992"}, @generic={0x10001, 0x88, "bbd58073cbb367a0d909ebe9af63c5f67962a00db2252f7ad6b7dc8b28f07e0966153d5d23af5735bc86c1ce836e935da2a860b8c052a0369be22df75a38fc6e73b5abe199d756b4cf0950e73e202f0508397194fb190c0f5dc3bab75c42bdab548c30aeb1100d8425fde88c4f67a005895a9bbe6b5b9fb63b4f9675d70645c3b342e66935c92968"}, @ra={0x5, 0x2, 0x8572}, @jumbo={0xc2, 0x4, 0x3d48fb8}, @generic={0xfffffffffffffffa, 0x18, "788ca5d251e134ddb50b5cb8156a80d0f5c0679d3770c683"}, @generic={0xdc3, 0xe2, "9b0ec6b5244c4326ff43090807ab214460ec8de8cace053e93b284e9ae5ef0076566a89122804920628364cf8daf0e8bd4bf823cc9ac2b78926bf3578bfea05b79a587bb9773a6d471b56d2b65b81d508f5ca1367ef7dfe3e7b2e65676c85e2ebff420cf4579e485c9717e702668eee5187e8f7f5d20a1e1cf9283af4e86cd931c99b1bd5566924b39417e212cd9acee95916d16f3a3df37373edfdf8f9a821d22d12505eefa4c0d99b76917d61ea613a82693dabb1c5595f4064e345add6a0ec16851fe4ccc109f7b1fa160b02418e9d56358977c6cdef1c6fea6da1646dda2973b"}, @enc_lim={0x4, 0x1, 0xb5a}]}], @icmpv6=@time_exceed={0x3, 0x1, 0x0, 0x7, [], {0x9, 0x6, "3dc39b", 0xff, 0xbf, 0x3d, @local, @mcast1, [@routing={0x33, 0x14, 0x1, 0xf, 0x0, [@initdev={0xfe, 0x88, [], 0x1, 0x0}, @mcast1, @rand_addr="49690840ed69c4e9ad51520123b73586", @initdev={0xfe, 0x88, [], 0x1, 0x0}, @rand_addr="f7a6b8de3482fc1799939b72ceaaa972", @mcast2, @ipv4={[], [], @rand_addr=0xff}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}]}, @srh={0xbf, 0x4, 0x4, 0x2, 0x40, 0x30, 0x3, [@mcast1, @loopback]}], "fd17c0d02d147cc9c2005c50607cead9048864f0dcba962b60629eede179c36bd8778d14165c06b2c02c1827a1cc541c11f504af1388dad8bca34b44143c4097b82bfb985a04651d14ea1739b30d917e6155e5bf50821dc84404d17d6b720b5443085f5b8ee5b05d60c13fd1f6012a9540bbb1d478"}}}}}}}}, &(0x7f0000000000)={0x1, 0x3, [0x51c, 0x2f1, 0x4fc, 0xb22]}) ptrace(0x4206, r1) tkill(r1, 0x9) 22:56:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0xa, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:56:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x800, 0x0) getsockopt$netlink(r3, 0x10e, 0x6, &(0x7f0000000200), &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) r4 = request_key(&(0x7f0000000080)='.dead\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='\'+H%*vboxnet0&@\x00', 0xfffffffffffffff9) r5 = add_key(&(0x7f0000000280)='pkcs7_test\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)="1938476cbb45154a79da7d3411d9209123454f21a0e718e79ac995a766f89101ea9647ada8a0b390b3ee765e05d7e660a34cbd3a7949bdb87ac3f7bc6a425f28300919d9fbec5bc5647715d0dd27c73ad80c2811628fdf35416e683909577224baffdcd66ec1c407220e4f795cc7794c747283083cca1c75b2b73ac18edfbd7d1fb97716201dad96af18bf02ea404e5eb623fb6055c73010d25c996ea98796b7e167ac0536de7f47bc7d60e4841f488a44fce85a2421d0b3b1966db533b05e9b3ec738e17baa2d462e1ad8309a730635c6bcf2f8b0062e194e65695aa709b14df41365437d", 0xe5, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000440)=@chain={'key_or_keyring:', r5, ':chain\x00'}) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) [ 3073.763992][ T861] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 22:56:01 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000100)={0xff, @rand_addr=0x6, 0x4e20, 0x3, 'fo\x00', 0x2, 0xba6a, 0x65}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r1) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4080, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f0000000000), 0x43578cf5) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r7, 0x4010640d, &(0x7f0000000140)={0x5, 0x2861}) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@remote}}, &(0x7f00000002c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) r10 = getuid() getresgid(&(0x7f0000000380), &(0x7f00000003c0)=0x0, &(0x7f0000000400)) sendmsg$netlink(r7, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=[@rights={{0x1c, 0x1, 0x1, [r7, r4, r4]}}, @rights={{0x18, 0x1, 0x1, [r6, r2]}}, @rights={{0x38, 0x1, 0x1, [r4, r3, r4, r1, r6, r3, r6, r1, r3, r0]}}, @rights={{0x18, 0x1, 0x1, [r4, r6]}}, @cred={{0x1c, 0x1, 0x2, {r5, r8, r9}}}, @cred={{0x1c, 0x1, 0x2, {r5, r10, r11}}}], 0xc8, 0x10}, 0x4000) tkill(r5, 0x9) [ 3073.829131][ T861] CPU: 0 PID: 861 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3073.836959][ T861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3073.847016][ T861] Call Trace: [ 3073.850308][ T861] dump_stack+0x1d8/0x2f8 [ 3073.854641][ T861] dump_header+0xd8/0x960 [ 3073.858978][ T861] oom_kill_process+0xcd/0x350 [ 3073.863740][ T861] out_of_memory+0x5c8/0x880 [ 3073.868330][ T861] try_charge+0x125a/0x1910 [ 3073.872848][ T861] mem_cgroup_try_charge+0x20c/0x680 [ 3073.878137][ T861] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3073.883768][ T861] wp_page_copy+0x35c/0x1980 [ 3073.888346][ T861] ? trace_lock_release+0x135/0x1a0 [ 3073.893529][ T861] ? do_wp_page+0x27f/0x1cc0 [ 3073.898112][ T861] ? __kasan_check_read+0x11/0x20 [ 3073.903125][ T861] ? do_raw_spin_unlock+0x49/0x260 [ 3073.908224][ T861] do_wp_page+0x5e5/0x1cc0 [ 3073.912632][ T861] ? __kasan_check_write+0x14/0x20 [ 3073.917757][ T861] handle_mm_fault+0x2adf/0x6010 [ 3073.922711][ T861] do_user_addr_fault+0x589/0xaf0 [ 3073.927731][ T861] __do_page_fault+0xd3/0x1f0 [ 3073.932397][ T861] do_page_fault+0x99/0xb0 [ 3073.936801][ T861] page_fault+0x39/0x40 [ 3073.940944][ T861] RIP: 0033:0x4034f2 [ 3073.944827][ T861] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 59 8d 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 79 42 05 00 48 [ 3073.964416][ T861] RSP: 002b:00007ffe602d2b50 EFLAGS: 00010246 [ 3073.970465][ T861] RAX: 0000000000000000 RBX: 00000000002ee5a9 RCX: 0000000000413430 22:56:01 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) [ 3073.978429][ T861] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffe602d3c80 [ 3073.986384][ T861] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000555555640940 [ 3073.994353][ T861] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe602d3c80 [ 3074.002308][ T861] R13: 00007ffe602d3c70 R14: 0000000000000000 R15: 00007ffe602d3c80 22:56:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0xb, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:56:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getrandom(&(0x7f00000000c0)=""/132, 0x84, 0x3) write(r2, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r1) tkill(r1, 0x9) [ 3074.091237][ T861] memory: usage 1032kB, limit 0kB, failcnt 3120030 [ 3074.099998][ T861] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3074.106947][ T861] Memory cgroup stats for /syz2: [ 3074.107031][ T861] anon 61440 [ 3074.107031][ T861] file 143360 [ 3074.107031][ T861] kernel_stack 0 [ 3074.107031][ T861] slab 851968 [ 3074.107031][ T861] sock 0 [ 3074.107031][ T861] shmem 0 [ 3074.107031][ T861] file_mapped 0 [ 3074.107031][ T861] file_dirty 0 [ 3074.107031][ T861] file_writeback 0 [ 3074.107031][ T861] anon_thp 0 [ 3074.107031][ T861] inactive_anon 0 [ 3074.107031][ T861] active_anon 61440 [ 3074.107031][ T861] inactive_file 0 [ 3074.107031][ T861] active_file 0 [ 3074.107031][ T861] unevictable 0 [ 3074.107031][ T861] slab_reclaimable 270336 [ 3074.107031][ T861] slab_unreclaimable 581632 [ 3074.107031][ T861] pgfault 209319 [ 3074.107031][ T861] pgmajfault 0 [ 3074.107031][ T861] workingset_refault 0 [ 3074.107031][ T861] workingset_activate 0 [ 3074.107031][ T861] workingset_nodereclaim 0 [ 3074.107031][ T861] pgrefill 0 22:56:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) r1 = socket(0xb, 0xa, 0x2) getsockname$ax25(r1, &(0x7f0000000080)={{0x3, @bcast}, [@rose, @bcast, @rose, @null, @default, @bcast, @null, @netrom]}, &(0x7f0000000100)=0x48) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r3}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r2, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) [ 3074.107031][ T861] pgscan 2083 [ 3074.107031][ T861] pgsteal 2083 [ 3074.107031][ T861] pgactivate 0 22:56:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0xc, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) [ 3074.229161][ T861] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=861,uid=0 [ 3074.333196][ T861] Memory cgroup out of memory: Killed process 861 (syz-executor.2) total-vm:72448kB, anon-rss:76kB, file-rss:34832kB, shmem-rss:0kB 22:56:02 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:56:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xd3fc}, 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r3}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x8, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x4}, 0x0, 0x0, &(0x7f0000000100)={0x1, 0xf, 0xe09f, 0x3}, &(0x7f0000000140)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r4, 0x4) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r2, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:56:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0xd, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:56:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bind$rose(r2, &(0x7f0000000000)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, 0x6, [@default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}, 0x40) write(r2, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) 22:56:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r1) tkill(r1, 0x9) 22:56:02 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) 22:56:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) fsetxattr$security_ima(r2, &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@v1={0x2, "e45be5e3a565bfc5688b97b1bbfa5cf1f47d"}, 0x13, 0x3) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:56:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0xe, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:56:02 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:56:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/4\x00') setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000000c0)=0x7ff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) r2 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000000), 0x43578cf5) tkill(r2, 0x9) timer_create(0x1, &(0x7f0000000100)={0x0, 0x27, 0x0, @tid=r2}, &(0x7f0000000140)) 22:56:02 executing program 4: r0 = accept(0xffffffffffffffff, &(0x7f00000000c0)=@isdn, &(0x7f0000000000)=0x80) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x7f}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0x7b528693, 0x4, 0x200, 0x4c5, 0x0}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000240)={r1, 0x1, 0x8, 0x0, 0x4, 0x10001, 0x200, 0x2, {r2, @in={{0x2, 0x4e21, @local}}, 0x2, 0x7, 0xfffffffffffffffa, 0x4, 0x6}}, &(0x7f0000000300)=0xb0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r4 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getdents(r5, &(0x7f0000000340)=""/17, 0x11) write(r6, &(0x7f0000000340), 0x87) ptrace(0x4206, r4) tkill(r4, 0x9) 22:56:02 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r5 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r5, 0x400454d4, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x87ff7) 22:56:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0xf, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:56:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x2041, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f00000000c0)={0x1}, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:56:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)=0x0) r2 = syz_open_procfs(r1, 0x0) r3 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r3) tkill(r3, 0x9) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r2, 0x1b, 0x1, 0x80000000, &(0x7f0000000000)=[0x0, 0x0], 0x2}, 0x20) 22:56:02 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r5 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r5, 0x400454d4, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x87ff7) 22:56:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) r1 = socket$kcm(0x11, 0x6, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r3}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xa) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000000080)=""/223, &(0x7f0000000200)=0xdf) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r2, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:56:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x4, 0x80) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000200), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x4000000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) wait4(r2, &(0x7f00000000c0), 0x80000000, &(0x7f0000000100)) r3 = gettid() pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000000), 0x43578cf5) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x7) tkill(r3, 0x9) 22:56:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x11, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:56:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x18) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x8000, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x100, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x2, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000300)="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"/485, 0x1020f) ptrace(0x4206, r1) tkill(r1, 0x9) [ 3076.063075][ T9909] device bridge_slave_1 left promiscuous mode [ 3076.069247][ T9909] bridge0: port 2(bridge_slave_1) entered disabled state [ 3076.123107][ T9909] device bridge_slave_0 left promiscuous mode [ 3076.129232][ T9909] bridge0: port 1(bridge_slave_0) entered disabled state [ 3076.823142][ T9909] device hsr_slave_0 left promiscuous mode [ 3076.862439][ T9909] device hsr_slave_1 left promiscuous mode [ 3076.907438][ T9909] team0 (unregistering): Port device team_slave_1 removed [ 3076.917886][ T9909] team0 (unregistering): Port device team_slave_0 removed [ 3076.927890][ T9909] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3076.966141][ T9909] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3077.040895][ T9909] bond0 (unregistering): Released all slaves [ 3077.138313][ T1620] IPVS: ftp: loaded support on port[0] = 21 [ 3077.186045][ T1620] chnl_net:caif_netlink_parms(): no params data found [ 3077.214015][ T1620] bridge0: port 1(bridge_slave_0) entered blocking state [ 3077.221111][ T1620] bridge0: port 1(bridge_slave_0) entered disabled state [ 3077.228692][ T1620] device bridge_slave_0 entered promiscuous mode [ 3077.236088][ T1620] bridge0: port 2(bridge_slave_1) entered blocking state [ 3077.243563][ T1620] bridge0: port 2(bridge_slave_1) entered disabled state [ 3077.251038][ T1620] device bridge_slave_1 entered promiscuous mode [ 3077.267252][ T1620] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3077.278051][ T1620] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3077.296707][ T1620] team0: Port device team_slave_0 added [ 3077.303463][ T1620] team0: Port device team_slave_1 added [ 3077.364585][ T1620] device hsr_slave_0 entered promiscuous mode [ 3077.402581][ T1620] device hsr_slave_1 entered promiscuous mode [ 3077.442375][ T1620] debugfs: Directory 'hsr0' with parent '/' already present! [ 3077.492924][ T1620] bridge0: port 2(bridge_slave_1) entered blocking state [ 3077.500015][ T1620] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3077.507350][ T1620] bridge0: port 1(bridge_slave_0) entered blocking state [ 3077.514431][ T1620] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3077.556513][ T1620] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3077.571488][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3077.580030][ T2829] bridge0: port 1(bridge_slave_0) entered disabled state [ 3077.590941][ T2829] bridge0: port 2(bridge_slave_1) entered disabled state [ 3077.602232][ T1620] 8021q: adding VLAN 0 to HW filter on device team0 [ 3077.616718][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3077.628738][ T2829] bridge0: port 1(bridge_slave_0) entered blocking state [ 3077.635818][ T2829] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3077.656538][T17947] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3077.668040][T17947] bridge0: port 2(bridge_slave_1) entered blocking state [ 3077.675151][T17947] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3077.696527][ T1620] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3077.707218][ T1620] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3077.720461][T14882] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3077.730518][T14882] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3077.739403][T14882] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3077.749254][T14882] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3077.768461][T14882] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3077.776226][T14882] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3077.788029][ T1620] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3077.906453][ T1628] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3077.918736][ T1628] CPU: 0 PID: 1628 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3077.926630][ T1628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3077.936669][ T1628] Call Trace: [ 3077.939937][ T1628] dump_stack+0x1d8/0x2f8 [ 3077.944335][ T1628] dump_header+0xd8/0x960 [ 3077.948643][ T1628] oom_kill_process+0xcd/0x350 [ 3077.953381][ T1628] out_of_memory+0x5c8/0x880 [ 3077.957961][ T1628] memory_max_write+0x4ba/0x600 [ 3077.962805][ T1628] ? memory_max_show+0xa0/0xa0 [ 3077.967545][ T1628] cgroup_file_write+0x223/0x5f0 [ 3077.972456][ T1628] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3077.977544][ T1628] kernfs_fop_write+0x3e4/0x4f0 [ 3077.982385][ T1628] ? kernfs_fop_read+0x580/0x580 [ 3077.987313][ T1628] __vfs_write+0xb8/0x740 [ 3077.991630][ T1628] ? check_preemption_disabled+0x47/0x2a0 [ 3077.997323][ T1628] ? __sb_start_write+0x403/0x4c0 [ 3078.002322][ T1628] vfs_write+0x275/0x590 [ 3078.006553][ T1628] ksys_write+0x117/0x220 [ 3078.010856][ T1628] __x64_sys_write+0x7b/0x90 [ 3078.015439][ T1628] do_syscall_64+0xfe/0x140 [ 3078.019922][ T1628] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3078.025785][ T1628] RIP: 0033:0x459829 [ 3078.029659][ T1628] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3078.049250][ T1628] RSP: 002b:00007f38e8fa0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3078.057673][ T1628] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 3078.065616][ T1628] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 3078.073562][ T1628] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3078.081516][ T1628] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f38e8fa16d4 [ 3078.089472][ T1628] R13: 00000000004c98fc R14: 00000000004e0ea8 R15: 00000000ffffffff [ 3078.106056][ T1628] memory: usage 3340kB, limit 0kB, failcnt 3120039 [ 3078.112720][ T1628] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3078.119625][ T1628] Memory cgroup stats for /syz2: [ 3078.119816][ T1628] anon 2195456 [ 3078.119816][ T1628] file 143360 [ 3078.119816][ T1628] kernel_stack 0 [ 3078.119816][ T1628] slab 851968 [ 3078.119816][ T1628] sock 0 [ 3078.119816][ T1628] shmem 0 [ 3078.119816][ T1628] file_mapped 0 [ 3078.119816][ T1628] file_dirty 0 [ 3078.119816][ T1628] file_writeback 0 [ 3078.119816][ T1628] anon_thp 2097152 [ 3078.119816][ T1628] inactive_anon 0 [ 3078.119816][ T1628] active_anon 2195456 [ 3078.119816][ T1628] inactive_file 0 [ 3078.119816][ T1628] active_file 0 [ 3078.119816][ T1628] unevictable 0 [ 3078.119816][ T1628] slab_reclaimable 270336 [ 3078.119816][ T1628] slab_unreclaimable 581632 [ 3078.119816][ T1628] pgfault 209352 [ 3078.119816][ T1628] pgmajfault 0 [ 3078.119816][ T1628] workingset_refault 0 [ 3078.119816][ T1628] workingset_activate 0 [ 3078.119816][ T1628] workingset_nodereclaim 0 [ 3078.119816][ T1628] pgrefill 0 [ 3078.119816][ T1628] pgscan 2083 22:56:05 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:56:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x12, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:56:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r3}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r3, 0x4008ae73, &(0x7f0000000200)={0x4, 0x3d}) read(r0, &(0x7f0000000080)=""/211, 0xd3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r2, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) [ 3078.119816][ T1628] pgsteal 2083 [ 3078.119816][ T1628] pgactivate 0 [ 3078.214849][ T1628] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=1626,uid=0 [ 3078.230660][ T1628] Memory cgroup out of memory: Killed process 1626 (syz-executor.2) total-vm:72712kB, anon-rss:2136kB, file-rss:34816kB, shmem-rss:0kB [ 3078.246992][ T1058] oom_reaper: reaped process 1626 (syz-executor.2), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB 22:56:05 executing program 5: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x2, 0x1) ioctl$VIDIOC_G_STD(r1, 0x80085617, &(0x7f00000000c0)) wait4(0x0, 0x0, 0x80000000, 0x0) r2 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000000), 0x43578cf5) tkill(r2, 0x9) 22:56:05 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r5 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r5, 0x400454d4, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x87ff7) 22:56:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r2 = gettid() r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000100)="df42cfd31ab728052d4d0b", 0xb, 0xfffffffffffffff8) r4 = request_key(&(0x7f0000000140)='trusted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='/self$eth1$wlan1\x00', 0xfffffffffffffffd) keyctl$link(0x8, r3, r4) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000200)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) write(r5, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r2) tkill(r2, 0x9) [ 3078.284356][ T1620] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 3078.352363][ T1620] CPU: 1 PID: 1620 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3078.360275][ T1620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3078.370326][ T1620] Call Trace: [ 3078.373620][ T1620] dump_stack+0x1d8/0x2f8 [ 3078.377951][ T1620] dump_header+0xd8/0x960 [ 3078.382281][ T1620] oom_kill_process+0xcd/0x350 [ 3078.387979][ T1620] out_of_memory+0x5c8/0x880 [ 3078.392578][ T1620] try_charge+0x125a/0x1910 [ 3078.397097][ T1620] mem_cgroup_try_charge+0x20c/0x680 [ 3078.402389][ T1620] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3078.408018][ T1620] wp_page_copy+0x35c/0x1980 [ 3078.412611][ T1620] ? trace_lock_release+0x135/0x1a0 [ 3078.417814][ T1620] ? do_wp_page+0x27f/0x1cc0 [ 3078.422417][ T1620] ? __kasan_check_read+0x11/0x20 [ 3078.427449][ T1620] ? do_raw_spin_unlock+0x49/0x260 [ 3078.432567][ T1620] do_wp_page+0x5e5/0x1cc0 [ 3078.436983][ T1620] ? __kasan_check_write+0x14/0x20 [ 3078.442105][ T1620] handle_mm_fault+0x2adf/0x6010 [ 3078.447058][ T1620] do_user_addr_fault+0x589/0xaf0 [ 3078.452085][ T1620] __do_page_fault+0xd3/0x1f0 [ 3078.456942][ T1620] do_page_fault+0x99/0xb0 [ 3078.461358][ T1620] page_fault+0x39/0x40 [ 3078.465499][ T1620] RIP: 0033:0x430906 [ 3078.469379][ T1620] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 5c 46 64 00 85 c0 0f 84 [ 3078.488972][ T1620] RSP: 002b:00007ffd21c9e290 EFLAGS: 00010206 22:56:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) [ 3078.496558][ T1620] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 3078.504515][ T1620] RDX: 00005555560a6930 RSI: 00005555560ae970 RDI: 0000000000000003 [ 3078.512476][ T1620] RBP: 0000000000008041 R08: 0000000000000001 R09: 00005555560a5940 [ 3078.520430][ T1620] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 3078.528390][ T1620] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 22:56:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x13, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) [ 3078.550126][ T1620] memory: usage 1004kB, limit 0kB, failcnt 3120048 [ 3078.564964][ T1620] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3078.589893][ T1620] Memory cgroup stats for /syz2: [ 3078.589978][ T1620] anon 86016 [ 3078.589978][ T1620] file 143360 [ 3078.589978][ T1620] kernel_stack 0 [ 3078.589978][ T1620] slab 851968 [ 3078.589978][ T1620] sock 0 [ 3078.589978][ T1620] shmem 0 [ 3078.589978][ T1620] file_mapped 0 [ 3078.589978][ T1620] file_dirty 0 [ 3078.589978][ T1620] file_writeback 0 [ 3078.589978][ T1620] anon_thp 0 [ 3078.589978][ T1620] inactive_anon 0 [ 3078.589978][ T1620] active_anon 86016 [ 3078.589978][ T1620] inactive_file 0 [ 3078.589978][ T1620] active_file 0 [ 3078.589978][ T1620] unevictable 0 [ 3078.589978][ T1620] slab_reclaimable 270336 [ 3078.589978][ T1620] slab_unreclaimable 581632 22:56:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:56:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xa3, 0x140) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept4$rose(r0, &(0x7f0000000100)=@full={0xb, @remote, @null, 0x0, [@rose, @netrom, @rose, @bcast, @remote, @bcast]}, &(0x7f0000000140)=0x40, 0x80800) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r1) tkill(r1, 0x9) 22:56:06 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_open_procfs(r3, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r2, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r5 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r5, 0x400454d4, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x87ff7) 22:56:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000340)='\x00'}, 0x30) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)={0x0, 0x0}) wait4(r1, 0x0, 0x1, 0x0) r2 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f00000000c0)={@empty, @rand_addr, 0x0}, &(0x7f0000000100)=0xc) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r3, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)=@getpolicy={0x98, 0x15, 0x404, 0x70bd2b, 0x1, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in6=@rand_addr="c1624d064f810ce3e2c863a8e45f9e7f", 0x7, 0xb2, 0x4e21, 0x20, 0xa, 0xa0, 0xa0, 0x62, r5, r6}, 0x6e6bb2}, [@replay_thresh={0x8, 0xb, 0x6}, @sec_ctx={0x14, 0x8, {0xf, 0x8, 0x1, 0x7fff, 0x7, "ff96b36cb2eb06"}}, @user_kmaddress={0x2c, 0x13, {@in6=@mcast2, @in=@remote}}]}, 0x98}, 0x1, 0x0, 0x0, 0x40}, 0xc0) write(r4, &(0x7f0000000000), 0x43578cf5) tkill(r2, 0x9) [ 3078.589978][ T1620] pgfault 209352 [ 3078.589978][ T1620] pgmajfault 0 [ 3078.589978][ T1620] workingset_refault 0 [ 3078.589978][ T1620] workingset_activate 0 [ 3078.589978][ T1620] workingset_nodereclaim 0 [ 3078.589978][ T1620] pgrefill 0 [ 3078.589978][ T1620] pgscan 2083 [ 3078.589978][ T1620] pgsteal 2083 [ 3078.589978][ T1620] pgactivate 0 [ 3078.847173][ T1620] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=1620,uid=0 [ 3078.896961][ T1620] Memory cgroup out of memory: Killed process 1620 (syz-executor.2) total-vm:72448kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB [ 3078.911177][ T1058] oom_reaper: reaped process 1620 (syz-executor.2), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 22:56:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x14, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:56:06 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:56:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x107fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2800, 0x0) r2 = gettid() write$FUSE_LK(r1, &(0x7f00000000c0)={0x28, 0x0, 0x8, {{0x9, 0x0, 0x1, r2}}}, 0x28) syz_open_procfs(0xffffffffffffffff, 0x0) r3 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r3) tkill(r3, 0x9) 22:56:06 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, 0x0) socket$kcm(0x11, 0x5, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r3}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r2, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:56:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x1ff, 0x1, 0xb, 0x1, "e112c1f6413ca015ef0016239892dc6c10b35f4e1ecc6e36c21118bae7fc54aa684f1eb8f130c6c52d278200afb6056e8d38c7c4ec64c6cdde4da1df10617cac", "f14f25894f86d87d7f0f907e0c4dbfe3e1f0adf90f639e42a90bee88d9b6d270", [0x6, 0x27b6]}) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @rand_addr, @multicast2}, &(0x7f0000000180)=0xc) sendmsg$xdp(r2, &(0x7f00000014c0)={&(0x7f00000001c0)={0x2c, 0x3, r4, 0x8}, 0x10, &(0x7f0000001440)=[{&(0x7f0000000200)="dc5ad83dcb4f64cb9272e19ff3c67de1c47452a490ea74c4714be20edb5fc4185330f414351d7ee8604685d5bc636afabd98d833757486b72b422f976a86c0406b7434d9b3ba5d7b4ec04d0e80b25d0b1eac4207d23bd6d5ada319a27c7ec1c0bfbd198c9e5bdfe4e2646078d2e728c700865b88e0223787639ef065078abcd87c58a7424b8aca94087eab8766ea34244e240c1e4d13bb50e82de133b616c49d7413cca9688b1a2c647fbc7f53d5f875f04c7b93be8708872f42cbe8986efb0b21e9", 0xc2}, {&(0x7f0000000300)="a353fa005fe4ab268cd45230be1571f0cf12e4807b9b4ceb6193d8aaf7bb106a88111b8f4a7fe7689f0d882cddc9", 0x2e}, {&(0x7f0000000340)="aa9e758b1bdc0fb2adcaf45f5c6044da7915f9a604a4049e185bc4f0c2b9d47167323a167055fd39c1f7c0a213e47722145f90f89a1f59dfabbbcd17ee9921cd63a5a95683d20f71215f405fab76", 0x4e}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000013c0)="e85ae7b417451ace7b6abb894ea2af742a5e2ee9fd6ddab8b1a688fdacbbabf4be63bc84a94ad442958416ee20d2ee90ac812b6a2a5c4fc27bac7287e230428122f3e9a37240a724063600", 0x4b}], 0x5, 0x0, 0x0, 0x40000}, 0x1) 22:56:06 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_open_procfs(r3, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r2, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r5 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r5, 0x400454d4, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x87ff7) 22:56:06 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:56:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() r2 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000000), 0x43578cf5) ptrace$setregs(0xf, r1, 0x3f, &(0x7f0000000000)="3ec2f0c60171ed7bbbc82eaed3") ptrace(0x4e, r2) tkill(r2, 0x9) 22:56:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x15, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:56:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) timer_create(0x1, &(0x7f00000001c0)={0x0, 0x25, 0x5, @thr={&(0x7f0000000240)="6e4b18ebe9c45d2d12c118f624bb1669c74f8a2a95ebb00bf5e75c5003849b847b8bd2bd45d8831365e11714433db5af6f8203f0b0bf87bf4a0ae08345e5ad7d934c9f9b9ea38f670a4158911e8a64262581ae1c54cd861af85edb31cfe797158bbd674d802b9ff6bb2b8192635ba87e9d64ff7c8153cfae76e804eb6d4245d02df9c8bfe5af4e45ea8bfe5c0086468b4a9130dbc6b1428f41a24d9edcfe4a946eec26da3cf17edb037c50895dd619899fabceb4b48bf71b13074ddb9fc9b33891a7c59890ac05c340a32626", &(0x7f0000000340)="785f32a241eeb18c1d086e345c"}}, &(0x7f0000000200)) tkill(r1, 0x9) 22:56:06 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_open_procfs(r3, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r2, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r5 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r5, 0x400454d4, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x87ff7) 22:56:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x16, &(0x7f0000000780)={r0, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:56:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, 0x0) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r4}, 0x10) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r6 = socket$kcm(0xa, 0x1, 0x0) r7 = socket(0x13, 0x6, 0xfffffffffffffffb) r8 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f0000000100)=0xe8) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000380)={@empty, @empty, 0x0}, &(0x7f00000003c0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000680)={'syzkaller1\x00', 0x0}) recvmmsg(r6, &(0x7f0000001a80)=[{{&(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f00000019c0)=[{&(0x7f0000001780)=""/83, 0x53}, {&(0x7f0000001800)=""/228, 0xe4}, {&(0x7f0000001900)=""/100, 0x64}, {&(0x7f0000001980)=""/12, 0xc}], 0x4, &(0x7f0000001a00)=""/98, 0x62}, 0x6}], 0x1, 0x20, &(0x7f0000001ac0)={0x77359400}) accept$packet(r0, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000002080)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000004c40)={'bcsh0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004c80)={{{@in=@multicast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000004d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000005200)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000005240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000005280)=0x14, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000005540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000005580)={{{@in=@multicast2, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000005680)=0xe8) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000056c0)={'veth0_to_team\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005740)={{{@in, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000005840)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000005880)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f00000058c0)={'team0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000005a40)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000005ac0)={'vcan0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005b00)={{{@in6=@mcast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000005c00)=0xe8) getsockname$packet(r5, &(0x7f0000005d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005d40)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000005d80)={'vcan0\x00', 0x0}) accept$packet(0xffffffffffffffff, &(0x7f0000005dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005e00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005e40)={{{@in6=@ipv4={[], [], @initdev}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000005f40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000005f80)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000006080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000060c0)={{{@in=@multicast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@remote}}, &(0x7f00000061c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r7, &(0x7f0000006b40)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40100000}, 0xc, &(0x7f0000006b00)={&(0x7f0000006200)={0x8fc, r8, 0x301, 0x70bd29, 0x25dfdbff, {}, [{{0x8, 0x1, r9}, {0x114, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r12}, {0x134, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r13}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r14}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r17}}}]}}, {{0x8, 0x1, r18}, {0x200, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x401}}, {0x8, 0x6, r19}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r20}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r22}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r23}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x119e}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r24}, {0x140, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x8c1c}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x222}}, {0x8, 0x6, r25}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r26}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r28}, {0x184, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r29}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5658}}, {0x8, 0x6, r30}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xfff}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r31}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}, {0x8}}}]}}, {{0x8, 0x1, r32}, {0xb4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r33}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x94b7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r34}, {0xf0, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r35}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x101}}, {0x8, 0x6, r36}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r37}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}}]}}]}, 0x8fc}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r3, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:56:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) r2 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_POLL(r1, &(0x7f0000000000)={0x18, 0xfffffffffffffffe, 0x6, {0x2}}, 0x18) write(r3, &(0x7f0000000000), 0x43578cf5) ptrace(0x18, r2) tkill(r2, 0x9) 22:56:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000000002, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:56:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) ioprio_get$pid(0x2, r1) ptrace(0x4206, r1) tkill(r1, 0x9) 22:56:07 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r5 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r5, 0x400454d4, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) sendfile(r1, 0xffffffffffffffff, 0x0, 0x87ff7) 22:56:07 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) [ 3080.622810][T12042] device bridge_slave_1 left promiscuous mode [ 3080.629009][T12042] bridge0: port 2(bridge_slave_1) entered disabled state [ 3080.693329][T12042] device bridge_slave_0 left promiscuous mode [ 3080.699476][T12042] bridge0: port 1(bridge_slave_0) entered disabled state [ 3081.432686][T12042] device hsr_slave_0 left promiscuous mode [ 3081.472395][T12042] device hsr_slave_1 left promiscuous mode [ 3081.517695][T12042] team0 (unregistering): Port device team_slave_1 removed [ 3081.527157][T12042] team0 (unregistering): Port device team_slave_0 removed [ 3081.536179][T12042] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3081.575817][T12042] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3081.651140][T12042] bond0 (unregistering): Released all slaves [ 3081.777730][ T2361] IPVS: ftp: loaded support on port[0] = 21 [ 3081.826920][ T2361] chnl_net:caif_netlink_parms(): no params data found [ 3081.849781][ T2361] bridge0: port 1(bridge_slave_0) entered blocking state [ 3081.857499][ T2361] bridge0: port 1(bridge_slave_0) entered disabled state [ 3081.864951][ T2361] device bridge_slave_0 entered promiscuous mode [ 3081.915012][ T2361] bridge0: port 2(bridge_slave_1) entered blocking state [ 3081.922103][ T2361] bridge0: port 2(bridge_slave_1) entered disabled state [ 3081.930210][ T2361] device bridge_slave_1 entered promiscuous mode [ 3081.951272][ T2361] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3081.966065][ T2361] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3081.987387][ T2361] team0: Port device team_slave_0 added [ 3081.994957][ T2361] team0: Port device team_slave_1 added [ 3082.067009][ T2361] device hsr_slave_0 entered promiscuous mode [ 3082.112968][ T2361] device hsr_slave_1 entered promiscuous mode [ 3082.192355][ T2361] debugfs: Directory 'hsr0' with parent '/' already present! [ 3082.208993][ T2361] bridge0: port 2(bridge_slave_1) entered blocking state [ 3082.216077][ T2361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3082.223413][ T2361] bridge0: port 1(bridge_slave_0) entered blocking state [ 3082.230468][ T2361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3082.265711][ T2361] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3082.278175][T32240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3082.286833][T32240] bridge0: port 1(bridge_slave_0) entered disabled state [ 3082.298300][T32240] bridge0: port 2(bridge_slave_1) entered disabled state [ 3082.310007][ T2361] 8021q: adding VLAN 0 to HW filter on device team0 [ 3082.321187][T32240] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3082.329642][T32240] bridge0: port 1(bridge_slave_0) entered blocking state [ 3082.336730][T32240] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3082.346840][T14882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3082.357337][T14882] bridge0: port 2(bridge_slave_1) entered blocking state [ 3082.364412][T14882] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3082.384096][T14882] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3082.394906][T14882] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3082.403420][T14882] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3082.411519][T14882] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3082.419726][T14882] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3082.429316][ T2361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3082.443928][ T2361] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3082.549065][ T2369] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3082.559553][ T2369] CPU: 0 PID: 2369 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3082.567421][ T2369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3082.577450][ T2369] Call Trace: [ 3082.580719][ T2369] dump_stack+0x1d8/0x2f8 [ 3082.585036][ T2369] dump_header+0xd8/0x960 [ 3082.589355][ T2369] oom_kill_process+0xcd/0x350 [ 3082.594108][ T2369] out_of_memory+0x5c8/0x880 [ 3082.598706][ T2369] memory_max_write+0x4ba/0x600 [ 3082.603563][ T2369] ? memory_max_show+0xa0/0xa0 [ 3082.608311][ T2369] cgroup_file_write+0x223/0x5f0 [ 3082.613253][ T2369] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3082.618356][ T2369] kernfs_fop_write+0x3e4/0x4f0 [ 3082.623192][ T2369] ? kernfs_fop_read+0x580/0x580 [ 3082.628134][ T2369] __vfs_write+0xb8/0x740 [ 3082.632449][ T2369] ? check_preemption_disabled+0x47/0x2a0 [ 3082.638154][ T2369] ? __sb_start_write+0x403/0x4c0 [ 3082.643163][ T2369] vfs_write+0x275/0x590 [ 3082.647392][ T2369] ksys_write+0x117/0x220 [ 3082.651696][ T2369] __x64_sys_write+0x7b/0x90 [ 3082.656264][ T2369] do_syscall_64+0xfe/0x140 [ 3082.660747][ T2369] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3082.666613][ T2369] RIP: 0033:0x459829 [ 3082.670481][ T2369] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3082.690057][ T2369] RSP: 002b:00007f6c1fca8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3082.698438][ T2369] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 3082.706383][ T2369] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 3082.714326][ T2369] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3082.722275][ T2369] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6c1fca96d4 [ 3082.730407][ T2369] R13: 00000000004c98fc R14: 00000000004e0ea8 R15: 00000000ffffffff [ 3082.739755][ T2369] memory: usage 5404kB, limit 0kB, failcnt 3120057 [ 3082.746984][ T2369] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3082.754200][ T2369] Memory cgroup stats for /syz2: [ 3082.754384][ T2369] anon 4317184 [ 3082.754384][ T2369] file 143360 [ 3082.754384][ T2369] kernel_stack 65536 [ 3082.754384][ T2369] slab 851968 [ 3082.754384][ T2369] sock 0 [ 3082.754384][ T2369] shmem 0 [ 3082.754384][ T2369] file_mapped 0 [ 3082.754384][ T2369] file_dirty 0 [ 3082.754384][ T2369] file_writeback 0 [ 3082.754384][ T2369] anon_thp 4194304 [ 3082.754384][ T2369] inactive_anon 0 [ 3082.754384][ T2369] active_anon 4317184 [ 3082.754384][ T2369] inactive_file 0 [ 3082.754384][ T2369] active_file 0 [ 3082.754384][ T2369] unevictable 0 [ 3082.754384][ T2369] slab_reclaimable 270336 [ 3082.754384][ T2369] slab_unreclaimable 581632 [ 3082.754384][ T2369] pgfault 209451 [ 3082.754384][ T2369] pgmajfault 0 [ 3082.754384][ T2369] workingset_refault 0 [ 3082.754384][ T2369] workingset_activate 0 [ 3082.754384][ T2369] workingset_nodereclaim 0 [ 3082.754384][ T2369] pgrefill 0 [ 3082.754384][ T2369] pgscan 2083 [ 3082.754384][ T2369] pgsteal 2083 22:56:10 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:56:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000000003, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:56:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x8003fffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) splice(r0, &(0x7f0000000080), r1, &(0x7f0000000200)=0x31, 0x8, 0x1) sync_file_range(r0, 0xffffffffffffb28f, 0x800, 0x4) wait4(0x0, 0x0, 0x80000000, 0x0) r2 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000000), 0x43578cf5) tkill(r2, 0x9) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$RNDADDENTROPY(r3, 0x40085203, &(0x7f0000000100)={0xe31, 0xd8, "ad6a97fca04828c89e1a58f637eccca4b72d50a21da87dcd74a4fdcf8ffae8381a808e8e6caea34e092d326bc87c2732e2bea87138bd24b265da1db5a94777bb3bf68c367b3f084a8f5d074bebb38b2dd3b40f7a1446539dad004fb28523ba2af44b930a9d6deea9cea21e889a2d6b29b66a91a87ff24224c51eb201cf58629441546a176e5439a5fa45c4aec0b83d1c5419de9b05808d1b1ba597a6727b7d6828d4704bbec71e8a5e4f98302a85a27046d0abebdea581f83600d69caf1190120cfce7934210479325635a8317a28065bf52f80d6a502613"}) 22:56:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x82) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:56:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000140)={r2, 0x3}, &(0x7f0000000180)=0x8) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r3 = gettid() stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25DELUID(r1, 0x89e2, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, r4}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r3) tkill(r3, 0x9) 22:56:10 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r5 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r5, 0x400454d4, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) sendfile(r1, 0xffffffffffffffff, 0x0, 0x87ff7) [ 3082.754384][ T2369] pgactivate 0 [ 3082.852557][ T2369] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=2367,uid=0 [ 3082.868706][ T2369] Memory cgroup out of memory: Killed process 2367 (syz-executor.2) total-vm:72712kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB [ 3082.886247][ T1058] oom_reaper: reaped process 2367 (syz-executor.2), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 3082.936142][ T2361] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 22:56:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) set_thread_area(&(0x7f0000000080)={0x11f, 0x20101000, 0x3400, 0x7, 0x7fff, 0x80bd00000, 0x4, 0x81, 0x1000, 0x7}) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:56:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) r2 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f0000000000)) write(r3, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r2) tkill(r2, 0x9) [ 3083.010548][ T2361] CPU: 1 PID: 2361 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3083.018469][ T2361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3083.028526][ T2361] Call Trace: [ 3083.028542][ T2361] dump_stack+0x1d8/0x2f8 [ 3083.028555][ T2361] dump_header+0xd8/0x960 [ 3083.028566][ T2361] oom_kill_process+0xcd/0x350 [ 3083.028580][ T2361] out_of_memory+0x5c8/0x880 [ 3083.036174][ T2361] try_charge+0x125a/0x1910 [ 3083.054303][ T2361] mem_cgroup_try_charge+0x20c/0x680 [ 3083.059590][ T2361] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3083.065233][ T2361] wp_page_copy+0x35c/0x1980 [ 3083.065245][ T2361] ? trace_lock_release+0x135/0x1a0 [ 3083.065254][ T2361] ? do_wp_page+0x27f/0x1cc0 [ 3083.065268][ T2361] ? __kasan_check_read+0x11/0x20 [ 3083.065282][ T2361] ? do_raw_spin_unlock+0x49/0x260 [ 3083.079617][ T2361] do_wp_page+0x5e5/0x1cc0 [ 3083.094116][ T2361] ? __kasan_check_write+0x14/0x20 [ 3083.099259][ T2361] handle_mm_fault+0x2adf/0x6010 [ 3083.104211][ T2361] do_user_addr_fault+0x589/0xaf0 22:56:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x80000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20000, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x3, 0x2) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000000780)=""/4096, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0xff}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000140)={0xff, 0x3, 0x1}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r3}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socket$kcm(0x29, 0x5, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r2, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) [ 3083.109244][ T2361] __do_page_fault+0xd3/0x1f0 [ 3083.113924][ T2361] do_page_fault+0x99/0xb0 [ 3083.118399][ T2361] page_fault+0x39/0x40 [ 3083.122549][ T2361] RIP: 0033:0x430906 [ 3083.126437][ T2361] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 5c 46 64 00 85 c0 0f 84 [ 3083.146044][ T2361] RSP: 002b:00007ffe14cb86b0 EFLAGS: 00010206 [ 3083.152111][ T2361] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 22:56:10 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x402080, 0x0) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r2 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r2) tkill(r2, 0x9) 22:56:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000000006, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) [ 3083.160078][ T2361] RDX: 00005555570c7930 RSI: 00005555570cf970 RDI: 0000000000000003 [ 3083.168046][ T2361] RBP: 0000000000008041 R08: 0000000000000001 R09: 00005555570c6940 [ 3083.176009][ T2361] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 3083.183979][ T2361] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 22:56:10 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r5 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r5, 0x400454d4, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) sendfile(r1, 0xffffffffffffffff, 0x0, 0x87ff7) [ 3083.262420][ T2361] memory: usage 1016kB, limit 0kB, failcnt 3120066 [ 3083.268960][ T2361] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3083.298923][ T2361] Memory cgroup stats for /syz2: [ 3083.299014][ T2361] anon 61440 [ 3083.299014][ T2361] file 143360 [ 3083.299014][ T2361] kernel_stack 0 [ 3083.299014][ T2361] slab 851968 [ 3083.299014][ T2361] sock 0 [ 3083.299014][ T2361] shmem 0 [ 3083.299014][ T2361] file_mapped 0 [ 3083.299014][ T2361] file_dirty 0 [ 3083.299014][ T2361] file_writeback 0 [ 3083.299014][ T2361] anon_thp 0 [ 3083.299014][ T2361] inactive_anon 0 [ 3083.299014][ T2361] active_anon 61440 [ 3083.299014][ T2361] inactive_file 0 [ 3083.299014][ T2361] active_file 0 [ 3083.299014][ T2361] unevictable 0 [ 3083.299014][ T2361] slab_reclaimable 270336 [ 3083.299014][ T2361] slab_unreclaimable 581632 [ 3083.299014][ T2361] pgfault 209451 [ 3083.299014][ T2361] pgmajfault 0 [ 3083.299014][ T2361] workingset_refault 0 [ 3083.299014][ T2361] workingset_activate 0 [ 3083.299014][ T2361] workingset_nodereclaim 0 [ 3083.299014][ T2361] pgrefill 0 [ 3083.299014][ T2361] pgscan 2083 [ 3083.299014][ T2361] pgsteal 2083 [ 3083.299014][ T2361] pgactivate 0 [ 3083.394529][ T2361] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=2361,uid=0 [ 3083.412107][ T2361] Memory cgroup out of memory: Killed process 2361 (syz-executor.2) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 3083.427687][ T1058] oom_reaper: reaped process 2361 (syz-executor.2), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 22:56:11 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:56:11 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setresuid(0xee00, 0xee01, 0x0) r1 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setresuid(r1, r3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r4, 0x80000) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x44400, 0x0) syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x1, 0x2) r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x40, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400201) clone(0x1200000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(r2, 0x0, 0xfffffffffffffffc, 0x0) r6 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpgrp(r6) write(r8, &(0x7f0000000000), 0x43578cf5) setsockopt$IP_VS_SO_SET_ZERO(r7, 0x0, 0x48f, &(0x7f0000000000)={0x2f, @multicast1, 0x4e20, 0xc5d4, 'none\x00', 0xa, 0x5, 0x2b}, 0x2c) ioctl$TIOCGETD(r7, 0x5424, &(0x7f0000000100)) tkill(r6, 0x9) 22:56:11 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r4 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x0, 0x2) r5 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x2, 0x101401) ioctl$UDMABUF_CREATE_LIST(r4, 0x40087543, &(0x7f0000000140)={0x0, 0x1, [{r5, 0x0, 0x1000, 0x1004000}]}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r3}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_int(r0, &(0x7f0000000080)='cgroup.max.descendants\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) mkdir(0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r5, 0x0, 0x41, &(0x7f0000000200)={'raw\x00', 0x4, [{}, {}, {}, {}]}, 0x68) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) ioctl$VIDIOC_G_PRIORITY(r5, 0x80045643, 0x3) 22:56:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000001c0)=0x0) r4 = syz_open_procfs(r3, 0x0) getsockopt$inet6_mreq(r4, 0x29, 0x14, &(0x7f0000000280)={@dev, 0x0}, &(0x7f00000002c0)=0x14) sched_getaffinity(r2, 0x8, &(0x7f0000000200)) sendmsg$can_raw(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x1d, r5}, 0x10, &(0x7f0000000380)={&(0x7f0000000340)=@can={{0x1, 0xfff, 0x1, 0xbc2}, 0x7, 0x1, 0x0, 0x0, "3b96a47613657669"}, 0x10}, 0x1, 0x0, 0x0, 0x44004}, 0x800) r6 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r6) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r7, &(0x7f0000000640)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000600)={&(0x7f0000000440)={0x1b0, r9, 0x8, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2000000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xa2e}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6b9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfb1}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6e}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_NODE={0x44, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9333}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_BEARER={0xf0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x21}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'teql0\x00'}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe221}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffff0195}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xdc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffff1a0}]}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'syzkaller0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x20000004}, 0x4000000) ptrace$getregset(0x4204, r6, 0x201, &(0x7f00000000c0)={&(0x7f0000000000)=""/43, 0x2b}) tkill(r6, 0x9) 22:56:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000000008, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:56:11 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) 22:56:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000000009, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:56:11 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x10003, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:56:11 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:56:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) r2 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x2, 0x8, 0x9, 0x10000, 0x0, 0x1, 0x40000, 0x3, 0x3, 0x8, 0xab1, 0x8, 0x7, 0x1, 0x7fffffff, 0x9, 0x1, 0xfff, 0x4c, 0xff, 0x5, 0x8, 0x9, 0x5, 0xf65c, 0x101, 0x1f, 0x3, 0x75, 0x8, 0x7, 0x7, 0x9, 0x6, 0x17, 0x32, 0x0, 0x80000001, 0x2, @perf_config_ext={0x3, 0x6}, 0x0, 0x0, 0x9, 0x5, 0xfffffffffffffffc, 0x4, 0x6}, r2, 0x8, r1, 0xb) write(r3, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r2) tkill(r2, 0x9) 22:56:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_int(r2, 0x6, 0x17, &(0x7f0000000000)=0x2, 0x4) write(r2, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) 22:56:11 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) 22:56:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x8000000000a, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:56:11 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x2, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x2140, 0x0) ioctl$VIDIOC_S_FBUF(r3, 0x4030560b, &(0x7f0000000200)={0x80, 0x4e, &(0x7f00000000c0)="9c795020a417ed5e6a14cf71a8347305d809ed92cf04113cff1acb1ca5a209bcbdf6cf07e7eeb5e92759bbf157e357608bd278b397e33ba9cd811dee7305e2dfa0cd229565fa6d593cf0f2761cf52e471f0cc9048eb62184ab39f94ff1cb39e3b2a21fbf36878cc7b42a250c4ba1dde78d1ddbfa40cd80e7fadf7ae48affc59287ab751ed370df4680297bce5f640665fe249218129f32a5260abb44ea42db7a", {0xfffffffffffffffd, 0x3, 0x384c4150, 0x8007, 0xd536, 0x2e36, 0xb, 0x769}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:56:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000000)={0x3, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1007, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x1000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r2 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r2) tkill(r2, 0x9) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f00000000c0)) [ 3084.209717][ T2967] Unknown ioctl 1076909579 22:56:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x8000000000b, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) [ 3084.295580][ T2982] Unknown ioctl 1076909579 22:56:11 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) 22:56:11 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x4000, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r3, 0x40305652, &(0x7f00000000c0)={0x2, 0x1, 0x10001, 0x4, 0x3ed2, 0x3, 0xca38}) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:56:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) membarrier(0x1, 0x0) write(r2, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r1) write$vhci(r2, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x41}, 0x2) tkill(r1, 0x9) 22:56:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x40000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) [ 3085.283058][T10699] device bridge_slave_1 left promiscuous mode [ 3085.289210][T10699] bridge0: port 2(bridge_slave_1) entered disabled state [ 3085.342976][T10699] device bridge_slave_0 left promiscuous mode [ 3085.349118][T10699] bridge0: port 1(bridge_slave_0) entered disabled state [ 3086.072647][T10699] device hsr_slave_0 left promiscuous mode [ 3086.162516][T10699] device hsr_slave_1 left promiscuous mode [ 3086.236607][T10699] team0 (unregistering): Port device team_slave_1 removed [ 3086.247169][T10699] team0 (unregistering): Port device team_slave_0 removed [ 3086.256857][T10699] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3086.324702][T10699] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3086.412153][T10699] bond0 (unregistering): Released all slaves [ 3086.508252][ T3236] IPVS: ftp: loaded support on port[0] = 21 [ 3086.557531][ T3236] chnl_net:caif_netlink_parms(): no params data found [ 3086.583764][ T3236] bridge0: port 1(bridge_slave_0) entered blocking state [ 3086.590871][ T3236] bridge0: port 1(bridge_slave_0) entered disabled state [ 3086.598672][ T3236] device bridge_slave_0 entered promiscuous mode [ 3086.606214][ T3236] bridge0: port 2(bridge_slave_1) entered blocking state [ 3086.614124][ T3236] bridge0: port 2(bridge_slave_1) entered disabled state [ 3086.621527][ T3236] device bridge_slave_1 entered promiscuous mode [ 3086.637295][ T3236] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3086.647945][ T3236] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3086.666145][ T3236] team0: Port device team_slave_0 added [ 3086.672993][ T3236] team0: Port device team_slave_1 added [ 3086.734574][ T3236] device hsr_slave_0 entered promiscuous mode [ 3086.792618][ T3236] device hsr_slave_1 entered promiscuous mode [ 3086.832381][ T3236] debugfs: Directory 'hsr0' with parent '/' already present! [ 3086.881449][ T3236] bridge0: port 2(bridge_slave_1) entered blocking state [ 3086.888546][ T3236] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3086.895916][ T3236] bridge0: port 1(bridge_slave_0) entered blocking state [ 3086.903008][ T3236] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3086.948682][ T3236] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3086.962677][T14882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3086.974655][T14882] bridge0: port 1(bridge_slave_0) entered disabled state [ 3086.982135][T14882] bridge0: port 2(bridge_slave_1) entered disabled state [ 3086.997256][ T3236] 8021q: adding VLAN 0 to HW filter on device team0 [ 3087.009362][T14882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3087.019609][T14882] bridge0: port 1(bridge_slave_0) entered blocking state [ 3087.026683][T14882] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3087.056970][T17947] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3087.065826][T17947] bridge0: port 2(bridge_slave_1) entered blocking state [ 3087.072927][T17947] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3087.085300][T17947] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3087.095223][T17947] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3087.105699][T17947] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3087.118707][ T3236] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3087.131707][ T3236] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3087.141753][T14882] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3087.151408][T14882] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3087.170891][ T3236] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3087.290208][ T3247] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3087.300598][ T3247] CPU: 1 PID: 3247 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3087.308583][ T3247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3087.318620][ T3247] Call Trace: [ 3087.321885][ T3247] dump_stack+0x1d8/0x2f8 [ 3087.326215][ T3247] dump_header+0xd8/0x960 [ 3087.330529][ T3247] oom_kill_process+0xcd/0x350 [ 3087.335272][ T3247] out_of_memory+0x5c8/0x880 [ 3087.339849][ T3247] memory_max_write+0x4ba/0x600 [ 3087.344683][ T3247] ? memory_max_show+0xa0/0xa0 [ 3087.349419][ T3247] cgroup_file_write+0x223/0x5f0 [ 3087.354330][ T3247] ? cgroup_seqfile_stop+0xc0/0xc0 [ 3087.359412][ T3247] kernfs_fop_write+0x3e4/0x4f0 [ 3087.364242][ T3247] ? kernfs_fop_read+0x580/0x580 [ 3087.369177][ T3247] __vfs_write+0xb8/0x740 [ 3087.373487][ T3247] ? check_preemption_disabled+0x47/0x2a0 [ 3087.379195][ T3247] ? __sb_start_write+0x403/0x4c0 [ 3087.384193][ T3247] vfs_write+0x275/0x590 [ 3087.388423][ T3247] ksys_write+0x117/0x220 [ 3087.392738][ T3247] __x64_sys_write+0x7b/0x90 [ 3087.397313][ T3247] do_syscall_64+0xfe/0x140 [ 3087.401790][ T3247] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3087.407679][ T3247] RIP: 0033:0x459829 [ 3087.411566][ T3247] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3087.431143][ T3247] RSP: 002b:00007f6787a3ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3087.439526][ T3247] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 3087.447472][ T3247] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 3087.455416][ T3247] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3087.463368][ T3247] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6787a3b6d4 [ 3087.471324][ T3247] R13: 00000000004c98fc R14: 00000000004e0ea8 R15: 00000000ffffffff [ 3087.481906][ T3247] memory: usage 5408kB, limit 0kB, failcnt 3120075 [ 3087.488728][ T3247] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3087.495698][ T3247] Memory cgroup stats for /syz2: [ 3087.496052][ T3247] anon 4317184 [ 3087.496052][ T3247] file 143360 [ 3087.496052][ T3247] kernel_stack 65536 [ 3087.496052][ T3247] slab 851968 [ 3087.496052][ T3247] sock 0 [ 3087.496052][ T3247] shmem 0 [ 3087.496052][ T3247] file_mapped 0 [ 3087.496052][ T3247] file_dirty 0 [ 3087.496052][ T3247] file_writeback 0 [ 3087.496052][ T3247] anon_thp 4194304 [ 3087.496052][ T3247] inactive_anon 0 [ 3087.496052][ T3247] active_anon 4317184 [ 3087.496052][ T3247] inactive_file 0 [ 3087.496052][ T3247] active_file 0 [ 3087.496052][ T3247] unevictable 0 [ 3087.496052][ T3247] slab_reclaimable 270336 [ 3087.496052][ T3247] slab_unreclaimable 581632 [ 3087.496052][ T3247] pgfault 209517 [ 3087.496052][ T3247] pgmajfault 0 [ 3087.496052][ T3247] workingset_refault 0 [ 3087.496052][ T3247] workingset_activate 0 [ 3087.496052][ T3247] workingset_nodereclaim 0 [ 3087.496052][ T3247] pgrefill 0 [ 3087.496052][ T3247] pgscan 2083 [ 3087.496052][ T3247] pgsteal 2083 [ 3087.496052][ T3247] pgactivate 0 [ 3087.591021][ T3247] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=3246,uid=0 [ 3087.607285][ T3247] Memory cgroup out of memory: Killed process 3246 (syz-executor.2) total-vm:72712kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB [ 3087.623844][ T1058] oom_reaper: reaped process 3246 (syz-executor.2), now anon-rss:0kB, file-rss:33856kB, shmem-rss:0kB 22:56:15 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:56:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0xfffffffffffffd8a) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x20000, 0x0) write$FUSE_STATFS(r3, &(0x7f00000000c0)={0x60, 0x0, 0x2, {{0xfffffffffffffffd, 0x0, 0x10000, 0xb4, 0x4, 0x4, 0x321f, 0x1ff}}}, 0x60) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:56:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x8000000000c, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:56:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) 22:56:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x40) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r2 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r2) tkill(r2, 0x9) 22:56:15 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40800, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000100)={&(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x3}) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000140)="e341d486e080c7d4ce705d97ce3b9203", 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r2 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000000), 0x43578cf5) tkill(r2, 0x9) [ 3087.679469][ T3236] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 3087.717152][ T3236] CPU: 0 PID: 3236 Comm: syz-executor.2 Not tainted 5.3.0-rc2+ #63 [ 3087.725054][ T3236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3087.735091][ T3236] Call Trace: [ 3087.738367][ T3236] dump_stack+0x1d8/0x2f8 [ 3087.742681][ T3236] dump_header+0xd8/0x960 [ 3087.747078][ T3236] oom_kill_process+0xcd/0x350 [ 3087.751932][ T3236] out_of_memory+0x5c8/0x880 [ 3087.756514][ T3236] try_charge+0x125a/0x1910 [ 3087.761013][ T3236] mem_cgroup_try_charge+0x20c/0x680 [ 3087.766283][ T3236] mem_cgroup_try_charge_delay+0x25/0xa0 [ 3087.771898][ T3236] handle_mm_fault+0x312f/0x6010 [ 3087.776834][ T3236] do_user_addr_fault+0x589/0xaf0 [ 3087.781846][ T3236] __do_page_fault+0xd3/0x1f0 [ 3087.786538][ T3236] do_page_fault+0x99/0xb0 [ 3087.790961][ T3236] page_fault+0x39/0x40 [ 3087.795097][ T3236] RIP: 0033:0x4577c1 [ 3087.798976][ T3236] Code: 48 81 ec 98 00 00 00 0f 05 48 3d 00 f0 ff ff 48 89 c3 0f 87 e9 00 00 00 85 db 0f 88 2f 01 00 00 48 89 e2 89 de bf 01 00 00 00 ba 13 00 00 85 c0 0f 88 98 00 00 00 8b 44 24 18 25 00 f0 00 00 [ 3087.818564][ T3236] RSP: 002b:00007ffd0f080f80 EFLAGS: 00010206 [ 3087.824611][ T3236] RAX: 0000000000000003 RBX: 0000000000000003 RCX: 00000000004577a0 [ 3087.832566][ T3236] RDX: 00007ffd0f080f80 RSI: 0000000000000003 RDI: 0000000000000001 [ 3087.840518][ T3236] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000555556b23940 [ 3087.848470][ T3236] R10: 0000000000000000 R11: 0000000000000202 R12: 00007ffd0f082160 [ 3087.856419][ T3236] R13: 00007ffd0f082150 R14: 0000000000000000 R15: 00007ffd0f082160 22:56:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x8000000000d, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:56:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) [ 3087.876395][ T3236] memory: usage 1020kB, limit 0kB, failcnt 3120088 22:56:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x7ff) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x1000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r1) tkill(r1, 0x9) [ 3087.940705][ T3236] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3088.020677][ T3236] Memory cgroup stats for /syz2: [ 3088.020750][ T3236] anon 57344 [ 3088.020750][ T3236] file 143360 [ 3088.020750][ T3236] kernel_stack 65536 [ 3088.020750][ T3236] slab 851968 [ 3088.020750][ T3236] sock 0 [ 3088.020750][ T3236] shmem 0 [ 3088.020750][ T3236] file_mapped 0 [ 3088.020750][ T3236] file_dirty 0 [ 3088.020750][ T3236] file_writeback 0 [ 3088.020750][ T3236] anon_thp 0 [ 3088.020750][ T3236] inactive_anon 0 [ 3088.020750][ T3236] active_anon 57344 [ 3088.020750][ T3236] inactive_file 0 22:56:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) write$tun(r1, &(0x7f00000000c0)={@void, @val={0x3, 0x0, 0x50d, 0x6, 0x9, 0x7}, @x25={0x3, 0x3, 0x27, "b11fc34fdfb049fdad671dd8b3cc81e71802941aea44a339cf54696737b40c0d29b012a527b66168bc5724dea8a62e5493b8856dbc421408ca9c23586f27783ac9101e6da1d70a3a3dc76b4203fb3f314016047220e6f94d1da705fb92a67e662e3c23812bf6d80a845f73f54a30a0dc35"}}, 0x7e) r2 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(r3, &(0x7f0000000000), 0x0) ptrace(0x4206, r2) tkill(r2, 0x9) 22:56:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x58, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) 22:56:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) ioprio_get$uid(0x3, r0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r3, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000740)) [ 3088.020750][ T3236] active_file 0 [ 3088.020750][ T3236] unevictable 0 [ 3088.020750][ T3236] slab_reclaimable 270336 [ 3088.020750][ T3236] slab_unreclaimable 581632 [ 3088.020750][ T3236] pgfault 209517 [ 3088.020750][ T3236] pgmajfault 0 [ 3088.020750][ T3236] workingset_refault 0 [ 3088.020750][ T3236] workingset_activate 0 [ 3088.020750][ T3236] workingset_nodereclaim 0 [ 3088.020750][ T3236] pgrefill 0 [ 3088.020750][ T3236] pgscan 2083 [ 3088.020750][ T3236] pgsteal 2083 [ 3088.020750][ T3236] pgactivate 0 [ 3088.145656][ T3236] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=3236,uid=0 [ 3088.165546][ T3236] Memory cgroup out of memory: Killed process 3236 (syz-executor.2) total-vm:72448kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB [ 3088.197562][ T1058] oom_reaper: reaped process 3236 (syz-executor.2), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 22:56:15 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:56:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) 22:56:15 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x400000, 0x0) r1 = inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xa0000000) inotify_rm_watch(r0, r1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, 0x0) socket$kcm(0x11, 0x800000000006, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(r2, 0x801054db, 0x0) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000200)={0x10001, 0xf, 0x4, 0x2070000, {0x0, 0x7530}, {0x5, 0xd, 0x5, 0xa92, 0x8, 0x10000, "4fc8b0ba"}, 0xfffffffffffffff8, 0x3, @planes=&(0x7f0000000100)={0x5, 0x0, @fd, 0x8}, 0x4}) write$cgroup_int(r3, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000740)) 22:56:15 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) 22:56:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpgrp(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000)='%,\x00', 0xffffffffffffffff}, 0x30) r2 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x20, 0x420a82) ioctl$VIDIOC_ENUMSTD(r2, 0xc0485619, &(0x7f0000000140)={0x8000, 0x40000, "ac073b8491eff62631c23de9e54059d0650e4800c25f2419", {0x1000, 0x6}, 0x10000}) syz_open_procfs(r1, 0x0) r3 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r3) tkill(r3, 0x9) 22:56:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x8000000000e, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:56:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f00000000c0)={@remote, @local, 0x1, 0x4, [@loopback, @dev={0xac, 0x14, 0x14, 0x200}, @loopback, @dev={0xac, 0x14, 0x14, 0xf}]}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = gettid() pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) tkill(r1, 0x9) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000000)) 22:56:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) r3 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f00000000c0)=0x9, 0x4) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000200)=""/172, 0xac) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) 22:56:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200001, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x140, 0x0) syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x78, 0x40) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x3c) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r2 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r2) tkill(r2, 0x9) 22:56:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x8000000000f, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:56:16 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000680)=""/104) r2 = socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x300000}, 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r2, 0x80000200000, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) close(r5) write$cgroup_int(r3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000740)) 22:56:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) fchown(r0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) 22:56:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000000011, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:56:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r1) tkill(r1, 0x9) 22:56:16 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r0, 0x4) ioctl$TUNGETFILTER(r2, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() ioctl$TIOCOUTQ(r3, 0x5411, &(0x7f00000003c0)) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r3, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000740)) writev(r1, &(0x7f0000000580)=[{&(0x7f0000000080)="c84ed38aae33b54fa0b83faf906ab95861d2eb3d30c7a1dd65170d39f484fae60f4bbedc277ecdb3f0866b823c49e7011549a42db79a99fb33d147e4011dd6ba1b51eaedc85f79ac93e1b9531fdc6ae3c6d8b4f2b4ee01126c29feac9c49e9d8cb1e96a39f8b5c09b6913d4acae2a32c807059f7012ad278f3f773846863a9076277f29536f82f0e862c563f633eb83c0947f1db0bdb96040fa8ed7a83ba26aa8f9e184d3944bc", 0xa7}, {&(0x7f0000000140)="42cd6d301e0f45f8536d6b70d4ffe79a5dc73a23e21d001b742f820dabcdc6e1462375", 0x23}, {&(0x7f0000000200)="d435c75f217c0895b0a30f18b212033f0139436b589685232912a48cf9e241dce11004e700c3c39dd2085f9fe28e93a2acd42b251b59d0fa8745ae08ca37dcb44013e40eaed2340c57445f3f1ce9da75c5a9f8bfd51bde3b75df1a46d1008ea969fdf9dba4a58067574e468ed83bf1386cf263a8b59cb6369dc96aa3eff0c861255b52456777ac6675ed88a396d334b8906afdcbf58732527661e853fbab08847fe4d2baf3bf19f6f9e95aa9647f", 0xae}, {&(0x7f00000002c0)="f96bd06a8ace5f5a073c02fb071ad9256247465b2659fbfff0cff7fbfaacf0de511e9192ca10e6ccc0630c4e2906e3db3bb87051530752740fa2cc39f0af583cf9ca38b2d361da0d0260920bd0afbcc506d7844c69e964bcd4e7fa7e0cbd9ca095fbbec701f2e4c2c2934ef4d329fb032462b3256f6b3c188c16228d81167109c60a53bdd97d4dae7c05b299ae6b4b674943d5cc90f6e7361ca6236cfa502d64d9230dcf7c6c5536d0c64cbfb3be199196f7839391980de7ac8bc2a674c7dc432dc721d46755173ab18f1d7701ec33", 0xcf}, {&(0x7f0000000440)="fb5cb45c1b583c4303127e9791aff9e601781cc64c1fb49c190e502b958b7ba82d9396649869839addd7f59217cf3ec0fa38c073097d646c97f24c81a1197426226a03850130a1ec3e1fd1c2352a0f4f10a6d5d2eddcb944eed366dd73c89244d38093dc7d10cb6dff553702d10272de58fcae5cbee4b2596cafdc1c30c996f1cb63854b54d18187c9f6b4d71134b89c0d7d7b786f9113144b383649c6e39271069a5e05028daf3d16091b7db89a1b729bf7e24e5b60", 0xb6}, {&(0x7f0000000640)="52ab915c6a5d3476c491d964e80b433fd57ccb6c67dc78c6e2775dbdc97c3f1c2df4a924632b384489d8121df846e9795ec2f3bf53d5024f1a19b4c2208b3885a5e750a9ec4715c7e49705271f9a5171ac0ba49807cd9dd2552cafe36106450d3bee33d8a4940794d3ad281e917ef3b902e9c6f03e843b7d4971d2d97784ca6cde669f", 0x83}], 0x6) 22:56:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000000012, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:56:16 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x6, 0x101000) 22:56:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) r2 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r2) ioctl$sock_inet_SIOCGIFDSTADDR(r3, 0x8917, &(0x7f0000000280)={'veth1\x00', {0x2, 0x4e24, @empty}}) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285629, &(0x7f0000000240)={0x0, 0x10001, 0x6, [], &(0x7f0000000200)=0x9}) tkill(r2, 0x9) io_setup(0x9, &(0x7f0000000000)=0x0) io_getevents(r5, 0x201, 0x6, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}], 0x0) getsockopt$inet6_dccp_int(r1, 0x21, 0x5, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$TIOCSBRK(r1, 0x5427) 22:56:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xd9d70000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000700)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xea20, 0x1, 0x16, 0x7}, 0xc) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xfffffffffffffff1) getresuid(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, 0x0) syz_open_procfs(r4, &(0x7f00000000c0)='autogroup\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r3, 0x5415, 0x0) open(0x0, 0x20000, 0x2000000000000000) r6 = creat(0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) ftruncate(r5, 0x2007fff) sendfile(r1, r5, 0x0, 0x87ff7) 22:56:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x243b, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000680)=""/104) r0 = socket$kcm(0x11, 0x6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={r0, 0x80000000013, 0x1, 0x0, 0x0, 0x34d}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x67}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, &(0x7f0000000200)=""/60, 0x3c}, 0x100) socketpair(0x1a, 0x803, 0x8, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xae) 22:56:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r2 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000000), 0x43578cf5) tkill(r2, 0x3e) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sched_getscheduler(r2) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r5, 0x1, 0x3, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x14) 22:56:16 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) socket$kcm(0x11, 0x6, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400), 0xc) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socketpair(0x0, 0x803, 0x8, 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x10000, 0x908faf677d3e13db) ioctl$NBD_SET_SIZE_BLOCKS(r4, 0xab07, 0x8000) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000200)={0x9, 0x7, 0x1, 0x6, 0x6, [{0x401, 0x4, 0x10000, 0x0, 0x0, 0x100}, {0x80000000, 0x7, 0x1c, 0x0, 0x0, 0x2900}, {0xfab, 0x9, 0x3, 0x0, 0x0, 0x210c}, {0xffffffff, 0x9, 0x10001, 0x0, 0x0, 0x800}, {0xffffffffffffffe0, 0x8, 0x1, 0x0, 0x0, 0x4}, {0x200, 0xc0000, 0x1000, 0x0, 0x0, 0x600}]}) getsockopt$XDP_STATISTICS(r4, 0x11b, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x18) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1ff) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) write$cgroup_int(r1, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000740)) [ 3089.263111][T14882] WARNING: CPU: 0 PID: 14882 at kernel/bpf/core.c:851 bpf_jit_free+0x1a8/0x1f0 [ 3089.272075][T14882] Kernel panic - not syncing: panic_on_warn set ... [ 3089.278659][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3089.286361][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3089.296412][T14882] Workqueue: events bpf_prog_free_deferred [ 3089.302209][T14882] Call Trace: [ 3089.305503][T14882] dump_stack+0x1d8/0x2f8 [ 3089.309848][T14882] panic+0x25c/0x799 [ 3089.313749][T14882] ? __warn+0x126/0x230 [ 3089.317908][T14882] __warn+0x22f/0x230 [ 3089.321897][T14882] ? bpf_jit_free+0x1a8/0x1f0 [ 3089.326572][T14882] report_bug+0x190/0x290 [ 3089.330911][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3089.338621][T14882] #PF: supervisor read access in kernel mode [ 3089.351272][T14882] #PF: error_code(0x0000) - not-present page [ 3089.357322][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3089.364863][T14882] Oops: 0000 [#1] PREEMPT SMP KASAN [ 3089.370058][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3089.377759][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3089.387817][T14882] Workqueue: events bpf_prog_free_deferred [ 3089.393618][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3089.399501][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3089.419099][T14882] RSP: 0000:ffff8880a7ff7828 EFLAGS: 00010806 [ 3089.425170][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3089.433130][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3089.441097][T14882] RBP: ffff8880a7ff7860 R08: ffffffff817dc75b R09: 0000000000000001 [ 3089.449061][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3089.457025][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3089.464993][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3089.473913][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3089.480505][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3089.488470][T14882] Call Trace: [ 3089.491765][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3089.499479][T14882] #PF: supervisor read access in kernel mode [ 3089.505480][T14882] #PF: error_code(0x0000) - not-present page [ 3089.511444][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3089.518987][T14882] Oops: 0000 [#2] PREEMPT SMP KASAN [ 3089.524180][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3089.531879][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3089.541931][T14882] Workqueue: events bpf_prog_free_deferred [ 3089.547735][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3089.553681][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3089.573276][T14882] RSP: 0000:ffff8880a7ff7450 EFLAGS: 00010806 [ 3089.579322][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3089.587278][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3089.595234][T14882] RBP: ffff8880a7ff7488 R08: ffffffff817dc75b R09: 0000000000000001 [ 3089.603186][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3089.611144][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3089.619103][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3089.628034][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3089.634616][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3089.642585][T14882] Call Trace: [ 3089.645870][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3089.653565][T14882] #PF: supervisor read access in kernel mode [ 3089.659537][T14882] #PF: error_code(0x0000) - not-present page [ 3089.665507][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3089.673044][T14882] Oops: 0000 [#3] PREEMPT SMP KASAN [ 3089.678222][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3089.685915][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3089.695967][T14882] Workqueue: events bpf_prog_free_deferred [ 3089.701766][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3089.707655][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3089.727243][T14882] RSP: 0000:ffff8880a7ff7080 EFLAGS: 00010806 [ 3089.733295][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3089.741251][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3089.749205][T14882] RBP: ffff8880a7ff70b8 R08: ffffffff817dc75b R09: 0000000000000001 [ 3089.757160][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3089.765121][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3089.773087][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3089.782001][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3089.788569][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3089.796528][T14882] Call Trace: [ 3089.799816][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3089.807508][T14882] #PF: supervisor read access in kernel mode [ 3089.813466][T14882] #PF: error_code(0x0000) - not-present page [ 3089.819424][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3089.826968][T14882] Oops: 0000 [#4] PREEMPT SMP KASAN [ 3089.832147][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3089.839850][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3089.849928][T14882] Workqueue: events bpf_prog_free_deferred [ 3089.855747][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3089.861619][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3089.881205][T14882] RSP: 0000:ffff8880a7ff6cb0 EFLAGS: 00010806 [ 3089.887251][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3089.895211][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3089.903167][T14882] RBP: ffff8880a7ff6ce8 R08: ffffffff817dc75b R09: 0000000000000001 [ 3089.911123][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3089.919090][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3089.927045][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3089.935960][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3089.942529][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3089.950483][T14882] Call Trace: [ 3089.953771][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3089.961468][T14882] #PF: supervisor read access in kernel mode [ 3089.967425][T14882] #PF: error_code(0x0000) - not-present page [ 3089.973396][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3089.980931][T14882] Oops: 0000 [#5] PREEMPT SMP KASAN [ 3089.986115][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3089.993807][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3090.003851][T14882] Workqueue: events bpf_prog_free_deferred [ 3090.009646][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3090.015520][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3090.035135][T14882] RSP: 0000:ffff8880a7ff68e0 EFLAGS: 00010806 [ 3090.041181][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3090.049137][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3090.057091][T14882] RBP: ffff8880a7ff6918 R08: ffffffff817dc75b R09: 0000000000000001 [ 3090.065048][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3090.073004][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3090.080987][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3090.089916][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3090.096485][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3090.104439][T14882] Call Trace: [ 3090.107733][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3090.115428][T14882] #PF: supervisor read access in kernel mode [ 3090.121410][T14882] #PF: error_code(0x0000) - not-present page [ 3090.127365][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3090.134913][T14882] Oops: 0000 [#6] PREEMPT SMP KASAN [ 3090.140095][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3090.147792][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3090.157840][T14882] Workqueue: events bpf_prog_free_deferred [ 3090.163647][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3090.169569][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3090.189178][T14882] RSP: 0000:ffff8880a7ff6510 EFLAGS: 00010806 [ 3090.195227][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3090.203181][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3090.211138][T14882] RBP: ffff8880a7ff6548 R08: ffffffff817dc75b R09: 0000000000000001 [ 3090.219093][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3090.227047][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3090.235019][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3090.243933][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3090.250502][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3090.258457][T14882] Call Trace: [ 3090.261747][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3090.269502][T14882] #PF: supervisor read access in kernel mode [ 3090.275472][T14882] #PF: error_code(0x0000) - not-present page [ 3090.281514][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3090.289059][T14882] Oops: 0000 [#7] PREEMPT SMP KASAN [ 3090.294241][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3090.301936][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3090.311984][T14882] Workqueue: events bpf_prog_free_deferred [ 3090.317807][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3090.323684][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3090.343287][T14882] RSP: 0000:ffff8880a7ff6140 EFLAGS: 00010806 [ 3090.349337][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3090.357290][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3090.365246][T14882] RBP: ffff8880a7ff6178 R08: ffffffff817dc75b R09: 0000000000000001 [ 3090.373203][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3090.381157][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3090.390615][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3090.399527][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3090.406101][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3090.414059][T14882] Call Trace: [ 3090.417351][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3090.425044][T14882] #PF: supervisor read access in kernel mode [ 3090.431002][T14882] #PF: error_code(0x0000) - not-present page [ 3090.436978][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3090.444534][T14882] Oops: 0000 [#8] PREEMPT SMP KASAN [ 3090.449715][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3090.457407][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3090.467494][T14882] Workqueue: events bpf_prog_free_deferred [ 3090.473308][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3090.479187][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3090.499371][T14882] RSP: 0000:ffff8880a7ff5d70 EFLAGS: 00010806 [ 3090.505423][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3090.513385][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3090.521339][T14882] RBP: ffff8880a7ff5da8 R08: ffffffff817dc75b R09: 0000000000000001 [ 3090.529300][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3090.537256][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3090.545214][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3090.554126][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3090.560699][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3090.568653][T14882] Call Trace: [ 3090.571947][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3090.579652][T14882] #PF: supervisor read access in kernel mode [ 3090.585607][T14882] #PF: error_code(0x0000) - not-present page [ 3090.591563][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3090.599099][T14882] Oops: 0000 [#9] PREEMPT SMP KASAN [ 3090.604294][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3090.611993][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3090.622043][T14882] Workqueue: events bpf_prog_free_deferred [ 3090.627840][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3090.633713][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3090.653304][T14882] RSP: 0000:ffff8880a7ff59a0 EFLAGS: 00010806 [ 3090.659354][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3090.667323][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3090.675279][T14882] RBP: ffff8880a7ff59d8 R08: ffffffff817dc75b R09: 0000000000000001 [ 3090.683258][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3090.691210][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3090.699165][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3090.708090][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3090.714655][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3090.722613][T14882] Call Trace: [ 3090.725916][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3090.733610][T14882] #PF: supervisor read access in kernel mode [ 3090.739568][T14882] #PF: error_code(0x0000) - not-present page [ 3090.745533][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3090.753072][T14882] Oops: 0000 [#10] PREEMPT SMP KASAN [ 3090.758341][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3090.766037][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3090.776082][T14882] Workqueue: events bpf_prog_free_deferred [ 3090.781876][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3090.787752][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3090.807341][T14882] RSP: 0000:ffff8880a7ff55d0 EFLAGS: 00010806 [ 3090.813419][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3090.821374][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3090.829330][T14882] RBP: ffff8880a7ff5608 R08: ffffffff817dc75b R09: 0000000000000001 [ 3090.837284][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3090.845239][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3090.853196][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3090.862141][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3090.868706][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3090.876666][T14882] Call Trace: [ 3090.879965][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3090.887662][T14882] #PF: supervisor read access in kernel mode [ 3090.893621][T14882] #PF: error_code(0x0000) - not-present page [ 3090.899576][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3090.907112][T14882] Oops: 0000 [#11] PREEMPT SMP KASAN [ 3090.912380][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3090.920076][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3090.930124][T14882] Workqueue: events bpf_prog_free_deferred [ 3090.935929][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3090.941820][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3090.961406][T14882] RSP: 0000:ffff8880a7ff5200 EFLAGS: 00010806 [ 3090.967461][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3090.975421][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3090.983378][T14882] RBP: ffff8880a7ff5238 R08: ffffffff817dc75b R09: 0000000000000001 [ 3090.991334][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3090.999290][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3091.007246][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3091.016179][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3091.022743][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3091.030710][T14882] Call Trace: [ 3091.034018][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3091.041712][T14882] #PF: supervisor read access in kernel mode [ 3091.047695][T14882] #PF: error_code(0x0000) - not-present page [ 3091.053652][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3091.061277][T14882] Oops: 0000 [#12] PREEMPT SMP KASAN [ 3091.066544][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3091.074237][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3091.084282][T14882] Workqueue: events bpf_prog_free_deferred [ 3091.090078][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3091.095957][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3091.115545][T14882] RSP: 0000:ffff8880a7ff4e30 EFLAGS: 00010806 [ 3091.121591][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3091.129554][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3091.137544][T14882] RBP: ffff8880a7ff4e68 R08: ffffffff817dc75b R09: 0000000000000001 [ 3091.145499][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3091.153454][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3091.161416][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3091.170325][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3091.176889][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3091.184847][T14882] Call Trace: [ 3091.188138][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3091.195832][T14882] #PF: supervisor read access in kernel mode [ 3091.201864][T14882] #PF: error_code(0x0000) - not-present page [ 3091.207821][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3091.215357][T14882] Oops: 0000 [#13] PREEMPT SMP KASAN [ 3091.220621][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3091.228312][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3091.238360][T14882] Workqueue: events bpf_prog_free_deferred [ 3091.244154][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3091.250043][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3091.269632][T14882] RSP: 0000:ffff8880a7ff4a60 EFLAGS: 00010806 [ 3091.275693][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3091.283649][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3091.291605][T14882] RBP: ffff8880a7ff4a98 R08: ffffffff817dc75b R09: 0000000000000001 [ 3091.299560][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3091.307511][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3091.315467][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3091.324380][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3091.330945][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3091.338904][T14882] Call Trace: [ 3091.342214][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3091.349908][T14882] #PF: supervisor read access in kernel mode [ 3091.355865][T14882] #PF: error_code(0x0000) - not-present page [ 3091.361834][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3091.369399][T14882] Oops: 0000 [#14] PREEMPT SMP KASAN [ 3091.374672][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3091.382380][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3091.392426][T14882] Workqueue: events bpf_prog_free_deferred [ 3091.398224][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3091.404099][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3091.423699][T14882] RSP: 0000:ffff8880a7ff4690 EFLAGS: 00010806 [ 3091.429746][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3091.437715][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3091.445672][T14882] RBP: ffff8880a7ff46c8 R08: ffffffff817dc75b R09: 0000000000000001 [ 3091.453627][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3091.461581][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3091.469536][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3091.478448][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3091.485016][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3091.492977][T14882] Call Trace: [ 3091.496271][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3091.503983][T14882] #PF: supervisor read access in kernel mode [ 3091.509942][T14882] #PF: error_code(0x0000) - not-present page [ 3091.515925][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3091.523465][T14882] Oops: 0000 [#15] PREEMPT SMP KASAN [ 3091.528730][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3091.536444][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3091.546491][T14882] Workqueue: events bpf_prog_free_deferred [ 3091.552291][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3091.558167][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3091.577752][T14882] RSP: 0000:ffff8880a7ff42c0 EFLAGS: 00010806 [ 3091.583803][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3091.591757][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3091.599711][T14882] RBP: ffff8880a7ff42f8 R08: ffffffff817dc75b R09: 0000000000000001 [ 3091.607682][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3091.615638][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3091.623596][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3091.632509][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3091.639073][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3091.647029][T14882] Call Trace: [ 3091.650318][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3091.658014][T14882] #PF: supervisor read access in kernel mode [ 3091.663976][T14882] #PF: error_code(0x0000) - not-present page [ 3091.669933][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3091.677477][T14882] Oops: 0000 [#16] PREEMPT SMP KASAN [ 3091.682743][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3091.690441][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3091.700490][T14882] Workqueue: events bpf_prog_free_deferred [ 3091.706288][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3091.712163][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3091.731846][T14882] RSP: 0000:ffff8880a7ff3ef0 EFLAGS: 00010806 [ 3091.737894][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3091.745858][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3091.753811][T14882] RBP: ffff8880a7ff3f28 R08: ffffffff817dc75b R09: 0000000000000001 [ 3091.761767][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3091.769723][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3091.777683][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3091.786769][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3091.793333][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3091.801288][T14882] Call Trace: [ 3091.804575][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3091.812270][T14882] #PF: supervisor read access in kernel mode [ 3091.818231][T14882] #PF: error_code(0x0000) - not-present page [ 3091.824190][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3091.831725][T14882] Oops: 0000 [#17] PREEMPT SMP KASAN [ 3091.836993][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3091.844705][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3091.854748][T14882] Workqueue: events bpf_prog_free_deferred [ 3091.860543][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3091.866418][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3091.886024][T14882] RSP: 0000:ffff8880a7ff3b20 EFLAGS: 00010806 [ 3091.892073][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3091.900030][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3091.907987][T14882] RBP: ffff8880a7ff3b58 R08: ffffffff817dc75b R09: 0000000000000001 [ 3091.915942][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3091.923903][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3091.931865][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3091.940777][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3091.947347][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3091.955305][T14882] Call Trace: [ 3091.958589][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3091.966283][T14882] #PF: supervisor read access in kernel mode [ 3091.972238][T14882] #PF: error_code(0x0000) - not-present page [ 3091.978200][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3091.985734][T14882] Oops: 0000 [#18] PREEMPT SMP KASAN [ 3091.991000][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3091.998692][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3092.008754][T14882] Workqueue: events bpf_prog_free_deferred [ 3092.014550][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3092.020423][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3092.040007][T14882] RSP: 0000:ffff8880a7ff3750 EFLAGS: 00010806 [ 3092.046057][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3092.054015][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3092.061974][T14882] RBP: ffff8880a7ff3788 R08: ffffffff817dc75b R09: 0000000000000001 [ 3092.069928][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3092.077890][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3092.085847][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3092.094758][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3092.101319][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3092.109279][T14882] Call Trace: [ 3092.112571][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3092.120267][T14882] #PF: supervisor read access in kernel mode [ 3092.126225][T14882] #PF: error_code(0x0000) - not-present page [ 3092.132182][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3092.139717][T14882] Oops: 0000 [#19] PREEMPT SMP KASAN [ 3092.144985][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3092.152681][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3092.162748][T14882] Workqueue: events bpf_prog_free_deferred [ 3092.168548][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3092.174425][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3092.194013][T14882] RSP: 0000:ffff8880a7ff3380 EFLAGS: 00010806 [ 3092.200059][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3092.208031][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3092.215988][T14882] RBP: ffff8880a7ff33b8 R08: ffffffff817dc75b R09: 0000000000000001 [ 3092.223943][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3092.231900][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3092.239858][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3092.248768][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3092.255336][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3092.263289][T14882] Call Trace: [ 3092.266574][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3092.274284][T14882] #PF: supervisor read access in kernel mode [ 3092.280251][T14882] #PF: error_code(0x0000) - not-present page [ 3092.286211][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3092.293763][T14882] Oops: 0000 [#20] PREEMPT SMP KASAN [ 3092.299045][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3092.306742][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3092.316791][T14882] Workqueue: events bpf_prog_free_deferred [ 3092.322652][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3092.328540][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3092.348138][T14882] RSP: 0000:ffff8880a7ff2fb0 EFLAGS: 00010806 [ 3092.354188][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3092.362144][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3092.370100][T14882] RBP: ffff8880a7ff2fe8 R08: ffffffff817dc75b R09: 0000000000000001 [ 3092.378064][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3092.386026][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3092.395274][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3092.404194][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3092.410759][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3092.418713][T14882] Call Trace: [ 3092.422018][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3092.429712][T14882] #PF: supervisor read access in kernel mode [ 3092.435685][T14882] #PF: error_code(0x0000) - not-present page [ 3092.441730][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3092.449264][T14882] Oops: 0000 [#21] PREEMPT SMP KASAN [ 3092.454531][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3092.462226][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3092.472278][T14882] Workqueue: events bpf_prog_free_deferred [ 3092.478080][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3092.483970][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3092.504065][T14882] RSP: 0000:ffff8880a7ff2be0 EFLAGS: 00010806 [ 3092.510113][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3092.518070][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3092.526025][T14882] RBP: ffff8880a7ff2c18 R08: ffffffff817dc75b R09: 0000000000000001 [ 3092.533979][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3092.541933][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3092.549895][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3092.558809][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3092.565376][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3092.573331][T14882] Call Trace: [ 3092.576621][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3092.584318][T14882] #PF: supervisor read access in kernel mode [ 3092.590275][T14882] #PF: error_code(0x0000) - not-present page [ 3092.596231][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3092.603781][T14882] Oops: 0000 [#22] PREEMPT SMP KASAN [ 3092.609052][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3092.616745][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3092.626790][T14882] Workqueue: events bpf_prog_free_deferred [ 3092.632610][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3092.638483][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3092.658070][T14882] RSP: 0000:ffff8880a7ff2810 EFLAGS: 00010806 [ 3092.664119][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3092.672070][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3092.680024][T14882] RBP: ffff8880a7ff2848 R08: ffffffff817dc75b R09: 0000000000000001 [ 3092.687981][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3092.695936][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3092.703899][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3092.712820][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3092.719393][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3092.727351][T14882] Call Trace: [ 3092.730651][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3092.738344][T14882] #PF: supervisor read access in kernel mode [ 3092.744302][T14882] #PF: error_code(0x0000) - not-present page [ 3092.750256][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3092.757795][T14882] Oops: 0000 [#23] PREEMPT SMP KASAN [ 3092.763062][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3092.770770][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3092.780816][T14882] Workqueue: events bpf_prog_free_deferred [ 3092.786616][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3092.792490][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3092.812078][T14882] RSP: 0000:ffff8880a7ff2440 EFLAGS: 00010806 [ 3092.818142][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3092.826111][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3092.834078][T14882] RBP: ffff8880a7ff2478 R08: ffffffff817dc75b R09: 0000000000000001 [ 3092.842033][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3092.849990][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3092.857948][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3092.866865][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3092.873432][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3092.881386][T14882] Call Trace: [ 3092.884674][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3092.892378][T14882] #PF: supervisor read access in kernel mode [ 3092.898334][T14882] #PF: error_code(0x0000) - not-present page [ 3092.904296][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3092.911841][T14882] Oops: 0000 [#24] PREEMPT SMP KASAN [ 3092.917108][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3092.924800][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3092.934847][T14882] Workqueue: events bpf_prog_free_deferred [ 3092.940659][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3092.946532][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3092.966117][T14882] RSP: 0000:ffff8880a7ff2070 EFLAGS: 00010806 [ 3092.972165][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3092.980121][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3092.988078][T14882] RBP: ffff8880a7ff20a8 R08: ffffffff817dc75b R09: 0000000000000001 [ 3092.996033][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3093.004002][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3093.011964][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3093.020873][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3093.027440][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3093.035400][T14882] Call Trace: [ 3093.038692][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3093.046386][T14882] #PF: supervisor read access in kernel mode [ 3093.052344][T14882] #PF: error_code(0x0000) - not-present page [ 3093.058300][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3093.065833][T14882] Oops: 0000 [#25] PREEMPT SMP KASAN [ 3093.071127][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3093.078831][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3093.088876][T14882] Workqueue: events bpf_prog_free_deferred [ 3093.094684][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3093.100568][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3093.120162][T14882] RSP: 0000:ffff8880a7ff1ca0 EFLAGS: 00010806 [ 3093.126212][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3093.134167][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3093.142121][T14882] RBP: ffff8880a7ff1cd8 R08: ffffffff817dc75b R09: 0000000000000001 [ 3093.150072][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3093.158030][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3093.165984][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3093.174907][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3093.181472][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3093.189435][T14882] Call Trace: [ 3093.192723][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3093.200427][T14882] #PF: supervisor read access in kernel mode [ 3093.206398][T14882] #PF: error_code(0x0000) - not-present page [ 3093.212357][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3093.219894][T14882] Oops: 0000 [#26] PREEMPT SMP KASAN [ 3093.225169][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3093.232863][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3093.242928][T14882] Workqueue: events bpf_prog_free_deferred [ 3093.248742][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3093.254617][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3093.274203][T14882] RSP: 0000:ffff8880a7ff18d0 EFLAGS: 00010806 [ 3093.280252][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3093.288206][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3093.296174][T14882] RBP: ffff8880a7ff1908 R08: ffffffff817dc75b R09: 0000000000000001 [ 3093.304129][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3093.312084][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3093.320038][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3093.328964][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3093.335542][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3093.343503][T14882] Call Trace: [ 3093.346811][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3093.354520][T14882] #PF: supervisor read access in kernel mode [ 3093.360477][T14882] #PF: error_code(0x0000) - not-present page [ 3093.366437][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3093.373976][T14882] Oops: 0000 [#27] PREEMPT SMP KASAN [ 3093.379244][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3093.386946][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3093.397008][T14882] Workqueue: events bpf_prog_free_deferred [ 3093.402814][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3093.408693][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3093.428285][T14882] RSP: 0000:ffff8880a7ff1500 EFLAGS: 00010806 [ 3093.434336][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3093.442290][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3093.450244][T14882] RBP: ffff8880a7ff1538 R08: ffffffff817dc75b R09: 0000000000000001 [ 3093.458199][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3093.466155][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3093.474112][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3093.483021][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3093.489585][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3093.497551][T14882] Call Trace: [ 3093.500853][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3093.508558][T14882] #PF: supervisor read access in kernel mode [ 3093.514515][T14882] #PF: error_code(0x0000) - not-present page [ 3093.520479][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3093.528024][T14882] Oops: 0000 [#28] PREEMPT SMP KASAN [ 3093.533293][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3093.540986][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3093.551043][T14882] Workqueue: events bpf_prog_free_deferred [ 3093.556839][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3093.562714][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3093.582300][T14882] RSP: 0000:ffff8880a7ff1130 EFLAGS: 00010806 [ 3093.588345][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3093.596302][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3093.604258][T14882] RBP: ffff8880a7ff1168 R08: ffffffff817dc75b R09: 0000000000000001 [ 3093.612216][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3093.620170][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3093.628129][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3093.637038][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3093.643610][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3093.651562][T14882] Call Trace: [ 3093.654883][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3093.662581][T14882] #PF: supervisor read access in kernel mode [ 3093.668536][T14882] #PF: error_code(0x0000) - not-present page [ 3093.674495][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3093.682029][T14882] Oops: 0000 [#29] PREEMPT SMP KASAN [ 3093.687304][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3093.695012][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3093.705058][T14882] Workqueue: events bpf_prog_free_deferred [ 3093.710851][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3093.716732][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3093.736327][T14882] RSP: 0000:ffff8880a7ff0d60 EFLAGS: 00010806 [ 3093.742375][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3093.750337][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3093.758291][T14882] RBP: ffff8880a7ff0d98 R08: ffffffff817dc75b R09: 0000000000000001 [ 3093.766246][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3093.774201][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3093.782159][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3093.791073][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3093.797641][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3093.805595][T14882] Call Trace: [ 3093.808887][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3093.816581][T14882] #PF: supervisor read access in kernel mode [ 3093.822537][T14882] #PF: error_code(0x0000) - not-present page [ 3093.828494][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3093.836032][T14882] Oops: 0000 [#30] PREEMPT SMP KASAN [ 3093.841309][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3093.849002][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3093.859058][T14882] Workqueue: events bpf_prog_free_deferred [ 3093.864941][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3093.870816][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3093.890407][T14882] RSP: 0000:ffff8880a7ff0990 EFLAGS: 00010806 [ 3093.896457][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3093.904413][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3093.912384][T14882] RBP: ffff8880a7ff09c8 R08: ffffffff817dc75b R09: 0000000000000001 [ 3093.920346][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3093.928307][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3093.936265][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3093.945177][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3093.951743][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3093.959699][T14882] Call Trace: [ 3093.962994][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3093.970688][T14882] #PF: supervisor read access in kernel mode [ 3093.976645][T14882] #PF: error_code(0x0000) - not-present page [ 3093.982604][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3093.990142][T14882] Thread overran stack, or stack corrupted [ 3093.995937][T14882] Oops: 0000 [#31] PREEMPT SMP KASAN [ 3094.001209][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3094.008921][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3094.018977][T14882] Workqueue: events bpf_prog_free_deferred [ 3094.024774][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3094.030649][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3094.050238][T14882] RSP: 0000:ffff8880a7ff05c0 EFLAGS: 00010806 [ 3094.056299][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3094.064253][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3094.072208][T14882] RBP: ffff8880a7ff05f8 R08: ffffffff817dc75b R09: 0000000000000001 [ 3094.080178][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3094.088137][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3094.096096][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3094.105006][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3094.111571][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3094.119525][T14882] Call Trace: [ 3094.122820][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3094.130512][T14882] #PF: supervisor read access in kernel mode [ 3094.136471][T14882] #PF: error_code(0x0000) - not-present page [ 3094.142428][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3094.149965][T14882] Thread overran stack, or stack corrupted [ 3094.155755][T14882] Oops: 0000 [#32] PREEMPT SMP KASAN [ 3094.161023][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3094.168718][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3094.178764][T14882] Workqueue: events bpf_prog_free_deferred [ 3094.184583][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3094.190456][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3094.210048][T14882] RSP: 0000:ffff8880a7ff01f0 EFLAGS: 00010806 [ 3094.216096][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3094.224055][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3094.232035][T14882] RBP: ffff8880a7ff0228 R08: ffffffff817dc75b R09: 0000000000000001 [ 3094.239992][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3094.247947][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3094.255911][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3094.264824][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3094.271389][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3094.279351][T14882] Call Trace: [ 3094.282653][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3094.290350][T14882] #PF: supervisor read access in kernel mode [ 3094.296309][T14882] #PF: error_code(0x0000) - not-present page [ 3094.302277][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3094.309809][T14882] Thread overran stack, or stack corrupted [ 3094.315609][T14882] Oops: 0000 [#33] PREEMPT SMP KASAN [ 3094.320884][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3094.328578][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3094.338626][T14882] Workqueue: events bpf_prog_free_deferred [ 3094.344420][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3094.350293][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3094.369881][T14882] RSP: 0000:ffff8880a7fefe20 EFLAGS: 00010806 [ 3094.375935][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3094.383898][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3094.393308][T14882] RBP: ffff8880a7fefe58 R08: ffffffff817dc75b R09: 0000000000000001 [ 3094.401263][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3094.409220][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3094.417176][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3094.426089][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3094.432653][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3094.440607][T14882] Call Trace: [ 3094.443895][T14882] ? __bad_area_nosemaphore+0x108/0x470 [ 3094.449426][T14882] ? rcu_lock_release+0x9/0x30 [ 3094.454179][T14882] ? bad_area_nosemaphore+0x2d/0x40 [ 3094.459359][T14882] ? __do_page_fault+0x1a4/0x1f0 [ 3094.464294][T14882] ? do_page_fault+0x99/0xb0 [ 3094.468871][T14882] ? page_fault+0x39/0x40 [ 3094.473201][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3094.480896][T14882] #PF: supervisor read access in kernel mode [ 3094.486854][T14882] #PF: error_code(0x0000) - not-present page [ 3094.492809][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3094.500852][T14882] Thread overran stack, or stack corrupted [ 3094.506643][T14882] Oops: 0000 [#34] PREEMPT SMP KASAN [ 3094.511911][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3094.519603][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3094.529649][T14882] Workqueue: events bpf_prog_free_deferred [ 3094.535445][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3094.541320][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3094.560911][T14882] RSP: 0000:ffff8880a7fefa50 EFLAGS: 00010806 [ 3094.566964][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3094.574941][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3094.582900][T14882] RBP: ffff8880a7fefa88 R08: ffffffff817dc75b R09: 0000000000000001 [ 3094.590856][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3094.598811][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3094.606789][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3094.615703][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3094.622270][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3094.630226][T14882] Call Trace: [ 3094.633513][T14882] ? __bad_area_nosemaphore+0x108/0x470 [ 3094.639058][T14882] ? rcu_lock_release+0x9/0x30 [ 3094.643814][T14882] ? bad_area_nosemaphore+0x2d/0x40 [ 3094.648995][T14882] ? __do_page_fault+0x1a4/0x1f0 [ 3094.653923][T14882] ? do_page_fault+0x99/0xb0 [ 3094.658514][T14882] ? page_fault+0x39/0x40 [ 3094.662838][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3094.670532][T14882] #PF: supervisor read access in kernel mode [ 3094.676488][T14882] #PF: error_code(0x0000) - not-present page [ 3094.682444][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3094.689977][T14882] Thread overran stack, or stack corrupted [ 3094.695766][T14882] Oops: 0000 [#35] PREEMPT SMP KASAN [ 3094.701036][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3094.708732][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3094.718786][T14882] Workqueue: events bpf_prog_free_deferred [ 3094.724592][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3094.730481][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3094.750064][T14882] RSP: 0000:ffff8880a7fef680 EFLAGS: 00010806 [ 3094.756109][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3094.764064][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3094.772123][T14882] RBP: ffff8880a7fef6b8 R08: ffffffff817dc75b R09: 0000000000000001 [ 3094.780077][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3094.788031][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3094.795993][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3094.804906][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3094.811469][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3094.819422][T14882] Call Trace: [ 3094.822744][T14882] ? __bad_area_nosemaphore+0x108/0x470 [ 3094.828287][T14882] ? rcu_lock_release+0x9/0x30 [ 3094.833043][T14882] ? bad_area_nosemaphore+0x2d/0x40 [ 3094.838224][T14882] ? __do_page_fault+0x1a4/0x1f0 [ 3094.843149][T14882] ? do_page_fault+0x99/0xb0 [ 3094.847751][T14882] ? page_fault+0x39/0x40 [ 3094.852087][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3094.859782][T14882] #PF: supervisor read access in kernel mode [ 3094.865743][T14882] #PF: error_code(0x0000) - not-present page [ 3094.871699][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3094.879233][T14882] Thread overran stack, or stack corrupted [ 3094.885032][T14882] Oops: 0000 [#36] PREEMPT SMP KASAN [ 3094.890299][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3094.897994][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3094.908139][T14882] Workqueue: events bpf_prog_free_deferred [ 3094.913946][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3094.919833][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3094.939425][T14882] RSP: 0000:ffff8880a7fef2b0 EFLAGS: 00010806 [ 3094.945478][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3094.953433][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3094.961391][T14882] RBP: ffff8880a7fef2e8 R08: ffffffff817dc75b R09: 0000000000000001 [ 3094.969346][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3094.977304][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3094.985262][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3094.994176][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3095.000743][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3095.008714][T14882] Call Trace: [ 3095.012001][T14882] ? __bad_area_nosemaphore+0x108/0x470 [ 3095.017532][T14882] ? rcu_lock_release+0x9/0x30 [ 3095.022287][T14882] ? bad_area_nosemaphore+0x2d/0x40 [ 3095.027471][T14882] ? __do_page_fault+0x1a4/0x1f0 [ 3095.032395][T14882] ? do_page_fault+0x99/0xb0 [ 3095.036976][T14882] ? page_fault+0x39/0x40 [ 3095.041303][T14882] BUG: unable to handle page fault for address: fffffbfff4002000 [ 3095.049014][T14882] #PF: supervisor read access in kernel mode [ 3095.054978][T14882] #PF: error_code(0x0000) - not-present page [ 3095.060940][T14882] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 9c1b0067 PTE 0 [ 3095.068476][T14882] Thread overran stack, or stack corrupted [ 3095.074271][T14882] Oops: 0000 [#37] PREEMPT SMP KASAN [ 3095.079560][T14882] CPU: 0 PID: 14882 Comm: kworker/0:5 Not tainted 5.3.0-rc2+ #63 [ 3095.087257][T14882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3095.097316][T14882] Workqueue: events bpf_prog_free_deferred [ 3095.103113][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3095.108989][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3095.128575][T14882] RSP: 0000:ffff8880a7feeee0 EFLAGS: 00010806 [ 3095.134638][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3095.142597][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3095.150550][T14882] RBP: ffff8880a7feef18 R08: ffffffff817dc75b R09: 0000000000000001 [ 3095.158507][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3095.166466][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3095.174427][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3095.183336][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3095.189919][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3095.197879][T14882] Call Trace: [ 3095.201143][T14882] Modules linked in: [ 3095.205025][T14882] CR2: fffffbfff4002000 [ 3095.209199][T14882] ---[ end trace 426a5c5385270efd ]--- [ 3095.214645][T14882] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 3095.220521][T14882] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 3095.240106][T14882] RSP: 0000:ffff8880a7ff7828 EFLAGS: 00010806 [ 3095.246152][T14882] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 3095.254108][T14882] RDX: ffff888090d88200 RSI: ffffffffff7a4e70 RDI: ffffffffa0010000 [ 3095.262068][T14882] RBP: ffff8880a7ff7860 R08: ffffffff817dc75b R09: 0000000000000001 [ 3095.270021][T14882] R10: fffffbfff117be75 R11: 0000000000000000 R12: ffffffffa0010000 [ 3095.277982][T14882] R13: 0000000000000000 R14: ffffffffff7a4e70 R15: ffff8880a0d5c578 [ 3095.285938][T14882] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 3095.294857][T14882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3095.301426][T14882] CR2: fffffbfff4002000 CR3: 0000000090c5c000 CR4: 00000000001406f0 [ 3095.309384][T14882] Kernel panic - not syncing: Fatal exception [ 3095.316451][T14882] Kernel Offset: disabled [ 3095.320778][T14882] Rebooting in 86400 seconds..