V6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000000340)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @rand_addr, @empty}, &(0x7f00000004c0)=0xc) r14 = creat(&(0x7f0000000700)='./bus\x00', 0x0) write$cgroup_type(r14, &(0x7f0000000200)='threaded\x00', 0xf642e7e) getsockopt$inet6_IPV6_XFRM_POLICY(r14, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000000600)=0xe8) r16 = socket$netlink(0x10, 0x3, 0x0) r17 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r17, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r17, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r16, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r18}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r18}]]}}}]}, 0x38}}, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast2, @loopback}, &(0x7f0000000680)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast2}}, &(0x7f00000007c0)=0xe8) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r21}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r21}]]}}}]}, 0x38}}, 0x0) r22 = socket$inet(0x2, 0x2, 0x0) sendmmsg$inet(r22, &(0x7f00000036c0)=[{{&(0x7f0000000340)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='<'], 0x1}}], 0x1, 0x0) getsockopt$inet_mreqn(r22, 0x0, 0x31, &(0x7f0000000940)={@remote, @remote, 0x0}, &(0x7f0000000980)=0xc) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r26}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r26}]]}}}]}, 0x38}}, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000d80)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000d40)={&(0x7f00000009c0)={0x358, r5, 0x100, 0x70bd27, 0x25dfdbfe, {}, [{{0x8, 0x1, r10}, {0x13c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r12}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffff8}}, {0x8, 0x6, r13}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffff800}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}]}}, {{0x8, 0x1, r18}, {0xec, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r19}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x11b}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}]}}, {{0x8}, {0x44, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r21}}, {0x8}}}]}}, {{0x8, 0x1, r23}, {0xb8, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r26}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}]}}]}, 0x358}, 0x1, 0x0, 0x0, 0x4000004}, 0x2116e17f341ed9cd) r27 = socket(0x10, 0x803, 0x0) r28 = socket(0x11, 0x800000003, 0x0) bind(r28, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r28, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r27, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@bridge_setlink={0x2c, 0x13, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r29}, [@IFLA_AF_SPEC={0xc, 0x1a, [{0x4, 0x1c}, {0x4, 0x7}]}]}, 0x2c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000100)={0x0, @broadcast, @multicast1}, &(0x7f0000000140)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) r30 = socket(0x10, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r30, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@bridge_setlink={0x2c, 0x13, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r31}, [@IFLA_AF_SPEC={0xc, 0x1a, [{0x4, 0x1c}, {0x4, 0x7}]}]}, 0x2c}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@mcast2, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000380)=0xe8) r32 = socket(0x10, 0x803, 0x0) r33 = socket(0x11, 0x800000003, 0x0) bind(r33, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r33, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r32, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@bridge_setlink={0x2c, 0x13, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r34}, [@IFLA_AF_SPEC={0xc, 0x1a, [{0x4, 0x1c}, {0x4, 0x7}]}]}, 0x2c}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005240)=[{{&(0x7f0000000480)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000001700)=[{&(0x7f0000000500)=""/68, 0x44}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/101, 0x65}, {&(0x7f0000001600)=""/216, 0xd8}], 0x4, &(0x7f0000001740)=""/172, 0xac}, 0x4c00}, {{&(0x7f0000001800)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/11, 0xb}, {&(0x7f00000018c0)=""/228, 0xe4}, {&(0x7f00000019c0)=""/115, 0x73}, {&(0x7f0000001a40)=""/119, 0x77}, {&(0x7f0000001ac0)=""/167, 0xa7}, {&(0x7f0000001b80)=""/4096, 0x1000}], 0x6, &(0x7f0000002c00)=""/169, 0xa9}, 0x7fffffff}, {{&(0x7f0000002cc0)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000003040)=[{&(0x7f0000002d40)=""/245, 0xf5}, {&(0x7f0000002e40)=""/197, 0xc5}, {&(0x7f0000002f40)=""/253, 0xfd}], 0x3, &(0x7f0000003080)=""/201, 0xc9}}, {{&(0x7f0000003180)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000003280)=[{&(0x7f0000003200)=""/105, 0x69}], 0x1, &(0x7f00000032c0)=""/210, 0xd2}, 0x4}, {{&(0x7f00000033c0)=@can, 0x80, &(0x7f0000003680)=[{&(0x7f0000003440)=""/155, 0x9b}, {&(0x7f0000003500)=""/155, 0x9b}, {&(0x7f00000035c0)=""/170, 0xaa}], 0x3, &(0x7f00000036c0)=""/135, 0x87}, 0x6}, {{&(0x7f0000003780)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x80, &(0x7f0000003a00)=[{&(0x7f0000003800)=""/140, 0x8c}, {&(0x7f00000038c0)=""/158, 0x9e}, {&(0x7f0000003980)=""/68, 0x44}], 0x3, &(0x7f0000003a40)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000004a40)=@ipx, 0x80, &(0x7f0000004bc0)=[{&(0x7f0000004ac0)=""/248, 0xf8}], 0x1, &(0x7f0000004c00)=""/56, 0x38}, 0xfffff000}, {{&(0x7f0000004c40)=@hci, 0x80, &(0x7f00000050c0)=[{&(0x7f0000004cc0)=""/216, 0xd8}, {&(0x7f0000004dc0)=""/255, 0xff}, {&(0x7f0000004ec0)=""/36, 0x24}, {&(0x7f0000004f00)=""/151, 0x97}, {&(0x7f0000004fc0)=""/251, 0xfb}], 0x5, &(0x7f0000005140)=""/214, 0xd6}, 0x2}], 0x8, 0x6000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) socket(0x10, 0x803, 0x0) r35 = socket(0x11, 0x800000003, 0x0) bind(r35, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@bridge_setlink={0x2c, 0x13, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r36}, [@IFLA_AF_SPEC={0xc, 0x1a, [{0x4, 0x1c}, {0x4, 0x7}]}]}, 0x2c}}, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, r37}) getsockname(r37, &(0x7f0000005800)=@can, &(0x7f0000005880)=0x80) socket(0x10, 0x803, 0x0) 16:38:14 executing program 5: 16:38:14 executing program 2: [ 1038.997422][T14662] device bridge_slave_1 left promiscuous mode [ 1039.003740][T14662] bridge0: port 2(bridge_slave_1) entered disabled state [ 1039.045700][T14662] device bridge_slave_0 left promiscuous mode [ 1039.051952][T14662] bridge0: port 1(bridge_slave_0) entered disabled state [ 1039.885181][T14662] device hsr_slave_0 left promiscuous mode [ 1039.955158][T14662] device hsr_slave_1 left promiscuous mode [ 1040.024514][T14662] team0 (unregistering): Port device team_slave_1 removed [ 1040.035927][T14662] team0 (unregistering): Port device team_slave_0 removed [ 1040.047338][T14662] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1040.130344][T14662] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1040.232474][T14662] bond0 (unregistering): Released all slaves [ 1040.362857][T15087] IPVS: ftp: loaded support on port[0] = 21 [ 1040.429372][T15087] chnl_net:caif_netlink_parms(): no params data found [ 1040.462871][T15087] bridge0: port 1(bridge_slave_0) entered blocking state [ 1040.470142][T15087] bridge0: port 1(bridge_slave_0) entered disabled state [ 1040.478039][T15087] device bridge_slave_0 entered promiscuous mode [ 1040.485905][T15087] bridge0: port 2(bridge_slave_1) entered blocking state [ 1040.493224][T15087] bridge0: port 2(bridge_slave_1) entered disabled state [ 1040.501261][T15087] device bridge_slave_1 entered promiscuous mode [ 1040.520050][T15087] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1040.531383][T15087] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1040.607215][T15087] team0: Port device team_slave_0 added [ 1040.614293][T15087] team0: Port device team_slave_1 added [ 1040.738025][T15087] device hsr_slave_0 entered promiscuous mode [ 1040.805322][T15087] device hsr_slave_1 entered promiscuous mode [ 1040.844994][T15087] debugfs: Directory 'hsr0' with parent '/' already present! [ 1040.867796][T15087] bridge0: port 2(bridge_slave_1) entered blocking state [ 1040.874931][T15087] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1040.882317][T15087] bridge0: port 1(bridge_slave_0) entered blocking state [ 1040.890504][T15087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1040.942092][T15087] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1040.961423][ T7206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1040.976807][ T7206] bridge0: port 1(bridge_slave_0) entered disabled state [ 1040.990426][ T7206] bridge0: port 2(bridge_slave_1) entered disabled state [ 1041.006222][T15087] 8021q: adding VLAN 0 to HW filter on device team0 [ 1041.023383][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1041.032888][ T2222] bridge0: port 1(bridge_slave_0) entered blocking state [ 1041.039968][ T2222] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1041.070994][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1041.079975][ T2222] bridge0: port 2(bridge_slave_1) entered blocking state [ 1041.087084][ T2222] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1041.102143][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1041.127177][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1041.141214][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1041.150164][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1041.162148][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1041.172336][T15087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1041.203881][T15087] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1041.569798][T15097] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1041.584676][T15097] CPU: 1 PID: 15097 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1041.592651][T15097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1041.602893][T15097] Call Trace: [ 1041.606199][T15097] dump_stack+0xf5/0x159 [ 1041.610443][T15097] dump_header+0xaa/0x449 [ 1041.614844][T15097] oom_kill_process.cold+0x10/0x15 [ 1041.622133][T15097] out_of_memory+0x231/0xa00 [ 1041.626718][T15097] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1041.633236][T15097] mem_cgroup_out_of_memory+0x128/0x150 [ 1041.638851][T15097] memory_max_write+0x17b/0x250 [ 1041.643717][T15097] cgroup_file_write+0x119/0x320 [ 1041.648919][T15097] ? high_work_func+0x30/0x30 [ 1041.653593][T15097] kernfs_fop_write+0x1f4/0x2e0 [ 1041.658440][T15097] ? cgroup_css.part.0+0x90/0x90 [ 1041.663382][T15097] __vfs_write+0x67/0xc0 [ 1041.667657][T15097] ? kernfs_seq_show+0xe0/0xe0 [ 1041.672440][T15097] vfs_write+0x18a/0x390 [ 1041.676706][T15097] ksys_write+0xd5/0x1b0 [ 1041.680940][T15097] __x64_sys_write+0x4c/0x60 [ 1041.685827][T15097] do_syscall_64+0xcc/0x370 [ 1041.690368][T15097] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1041.696254][T15097] RIP: 0033:0x459f39 [ 1041.700187][T15097] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1041.719775][T15097] RSP: 002b:00007f46705a7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1041.728172][T15097] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1041.736130][T15097] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000b [ 1041.744106][T15097] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1041.752062][T15097] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f46705a86d4 [ 1041.760036][T15097] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1041.769058][T15097] memory: usage 4672kB, limit 0kB, failcnt 614 [ 1041.775700][T15097] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1041.782552][T15097] Memory cgroup stats for /syz3: [ 1041.782877][T15097] anon 4317184 [ 1041.782877][T15097] file 45056 [ 1041.782877][T15097] kernel_stack 36864 [ 1041.782877][T15097] slab 282624 [ 1041.782877][T15097] sock 0 [ 1041.782877][T15097] shmem 0 [ 1041.782877][T15097] file_mapped 0 [ 1041.782877][T15097] file_dirty 135168 [ 1041.782877][T15097] file_writeback 0 [ 1041.782877][T15097] anon_thp 4194304 [ 1041.782877][T15097] inactive_anon 0 [ 1041.782877][T15097] active_anon 4317184 [ 1041.782877][T15097] inactive_file 135168 [ 1041.782877][T15097] active_file 135168 [ 1041.782877][T15097] unevictable 135168 [ 1041.782877][T15097] slab_reclaimable 135168 [ 1041.782877][T15097] slab_unreclaimable 147456 [ 1041.782877][T15097] pgfault 52536 [ 1041.782877][T15097] pgmajfault 0 [ 1041.782877][T15097] workingset_refault 0 [ 1041.782877][T15097] workingset_activate 0 [ 1041.782877][T15097] workingset_nodereclaim 0 [ 1041.782877][T15097] pgrefill 198 [ 1041.782877][T15097] pgscan 198 [ 1041.782877][T15097] pgsteal 0 [ 1041.782877][T15097] pgactivate 198 [ 1041.879722][T15097] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=15093,uid=0 [ 1041.895612][T15097] Memory cgroup out of memory: Killed process 15093 (syz-executor.3) total-vm:72852kB, anon-rss:4244kB, file-rss:35824kB, shmem-rss:0kB, UID:0 pgtables:151552kB oom_score_adj:1000 [ 1041.921079][ T1063] oom_reaper: reaped process 15093 (syz-executor.3), now anon-rss:0kB, file-rss:34864kB, shmem-rss:0kB 16:38:18 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:38:18 executing program 4: 16:38:18 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:38:18 executing program 2: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000002c0)={0x5, {{0x2, 0x0, @multicast1}}}, 0x8c) 16:38:18 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='schedstat\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x600000, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) read$FUSE(r0, &(0x7f0000001780), 0x1000) write$FUSE_ENTRY(r0, &(0x7f00000005c0)={0x90, 0x0, 0x2}, 0x90) write$FUSE_ENTRY(r0, &(0x7f0000000380)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x3f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}}}, 0x90) 16:38:18 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001a00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x651, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2b8e08cd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xff2, 0x0, 0x8a4, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5c5b, 0x0, 0x7fffffff, 0xc739, 0x0, 0xd95, 0x9, 0x0, 0x0, 0x7fff, 0x0, 0x2, 0x0, 0xf43, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3ff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x73, 0x0, 0x1f], [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1bb40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x374, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [0x0, 0x0, 0x1e342bc1, 0x400, 0x8000, 0x7, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6cba, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xbb2, 0x0, 0x0, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0xab1a, 0x5]}, 0x45c) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 1042.520081][T15087] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1042.602138][T15087] CPU: 1 PID: 15087 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1042.610084][T15087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1042.620154][T15087] Call Trace: [ 1042.623538][T15087] dump_stack+0xf5/0x159 [ 1042.627831][T15087] dump_header+0xaa/0x449 [ 1042.632220][T15087] oom_kill_process.cold+0x10/0x15 [ 1042.637393][T15087] out_of_memory+0x231/0xa00 [ 1042.642254][T15087] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1042.647930][T15087] mem_cgroup_out_of_memory+0x128/0x150 [ 1042.653513][T15087] try_charge+0xb3a/0xbc0 [ 1042.657883][T15087] ? rcu_note_context_switch+0x700/0x760 [ 1042.663579][T15087] mem_cgroup_try_charge+0xd2/0x260 [ 1042.668802][T15087] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1042.674495][T15087] wp_page_copy+0x322/0x1160 [ 1042.679103][T15087] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1042.684765][T15087] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1042.690434][T15087] do_wp_page+0x192/0x11f0 [ 1042.694878][T15087] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1042.700628][T15087] __handle_mm_fault+0x1c07/0x2cb0 [ 1042.705815][T15087] handle_mm_fault+0x21b/0x530 [ 1042.710620][T15087] __do_page_fault+0x3fb/0x9e0 [ 1042.715501][T15087] do_page_fault+0x54/0x233 [ 1042.720031][T15087] ? prepare_exit_to_usermode+0x154/0x1a0 [ 1042.725823][T15087] page_fault+0x34/0x40 [ 1042.729993][T15087] RIP: 0033:0x431016 16:38:18 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) link(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='./file1/file0\x00') lsetxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='security.ima\x00', 0x0, 0x0, 0x0) [ 1042.734030][T15087] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 cc 5c 64 00 85 c0 0f 84 [ 1042.753648][T15087] RSP: 002b:00007ffc5a473250 EFLAGS: 00010206 [ 1042.759733][T15087] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1042.767723][T15087] RDX: 0000000001bd7930 RSI: 0000000001bdf970 RDI: 0000000000000003 [ 1042.775711][T15087] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000001bd6940 [ 1042.783757][T15087] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1042.791746][T15087] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 16:38:18 executing program 2: [ 1042.885154][T15087] memory: usage 252kB, limit 0kB, failcnt 631 [ 1042.893755][T15087] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1042.935933][T15087] Memory cgroup stats for /syz3: [ 1042.936317][T15087] anon 40960 [ 1042.936317][T15087] file 45056 [ 1042.936317][T15087] kernel_stack 36864 [ 1042.936317][T15087] slab 282624 [ 1042.936317][T15087] sock 0 [ 1042.936317][T15087] shmem 0 [ 1042.936317][T15087] file_mapped 0 [ 1042.936317][T15087] file_dirty 135168 [ 1042.936317][T15087] file_writeback 0 [ 1042.936317][T15087] anon_thp 0 [ 1042.936317][T15087] inactive_anon 0 [ 1042.936317][T15087] active_anon 40960 [ 1042.936317][T15087] inactive_file 135168 [ 1042.936317][T15087] active_file 135168 [ 1042.936317][T15087] unevictable 135168 [ 1042.936317][T15087] slab_reclaimable 135168 [ 1042.936317][T15087] slab_unreclaimable 147456 [ 1042.936317][T15087] pgfault 52569 [ 1042.936317][T15087] pgmajfault 0 [ 1042.936317][T15087] workingset_refault 0 [ 1042.936317][T15087] workingset_activate 0 [ 1042.936317][T15087] workingset_nodereclaim 0 [ 1042.936317][T15087] pgrefill 198 [ 1042.936317][T15087] pgscan 198 [ 1042.936317][T15087] pgsteal 0 [ 1042.936317][T15087] pgactivate 198 16:38:19 executing program 4: syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x2, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fchown(r0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000004c0)) quotactl(0x0, 0x0, 0x0, &(0x7f0000000680)="905a0030063fc2f3c483065793ff748db4fdba52836a6228e7593297dddb801c38a22d0bbd61435d1b77f6b3") fchown(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000), 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000540)) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) fchown(r3, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 16:38:19 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:38:19 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001a00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x651, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2b8e08cd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xff2, 0x0, 0x8a4, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5c5b, 0x0, 0x7fffffff, 0xc739, 0x0, 0xd95, 0x9, 0x0, 0x0, 0x7fff, 0x0, 0x2, 0x0, 0xf43, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3ff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x73, 0x0, 0x1f], [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1bb40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x374, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [0x0, 0x0, 0x1e342bc1, 0x400, 0x8000, 0x7, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6cba, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xbb2, 0x0, 0x0, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0xab1a, 0x5]}, 0x45c) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 16:38:19 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_int(r0, 0x0, 0x6, 0x0, &(0x7f0000000140)) [ 1043.518587][T15087] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=15087,uid=0 [ 1043.596382][T15087] Memory cgroup out of memory: Killed process 15087 (syz-executor.3) total-vm:72456kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 [ 1043.738587][ T1063] oom_reaper: reaped process 15087 (syz-executor.3), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 16:38:20 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:38:20 executing program 4: syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x2, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fchown(r0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000004c0)) quotactl(0x0, 0x0, 0x0, &(0x7f0000000680)="905a0030063fc2f3c483065793ff748db4fdba52836a6228e7593297dddb801c38a22d0bbd61435d1b77f6b3") fchown(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000), 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000540)) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) fchown(r3, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 1044.390786][T14662] device bridge_slave_1 left promiscuous mode [ 1044.409862][T14662] bridge0: port 2(bridge_slave_1) entered disabled state [ 1044.475918][T14662] device bridge_slave_0 left promiscuous mode [ 1044.482178][T14662] bridge0: port 1(bridge_slave_0) entered disabled state [ 1045.305428][T14662] device hsr_slave_0 left promiscuous mode [ 1045.345078][T14662] device hsr_slave_1 left promiscuous mode [ 1045.400123][T14662] team0 (unregistering): Port device team_slave_1 removed [ 1045.411937][T14662] team0 (unregistering): Port device team_slave_0 removed [ 1045.424077][T14662] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1045.500241][T14662] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1045.582400][T14662] bond0 (unregistering): Released all slaves [ 1045.664022][T15435] IPVS: ftp: loaded support on port[0] = 21 [ 1045.727509][T15435] chnl_net:caif_netlink_parms(): no params data found [ 1045.815059][T15435] bridge0: port 1(bridge_slave_0) entered blocking state [ 1045.822213][T15435] bridge0: port 1(bridge_slave_0) entered disabled state [ 1045.834597][T15435] device bridge_slave_0 entered promiscuous mode [ 1045.842704][T15435] bridge0: port 2(bridge_slave_1) entered blocking state [ 1045.854102][T15435] bridge0: port 2(bridge_slave_1) entered disabled state [ 1045.862319][T15435] device bridge_slave_1 entered promiscuous mode [ 1045.894249][T15435] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1045.910503][T15435] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1045.938644][T15435] team0: Port device team_slave_0 added [ 1045.950089][T15435] team0: Port device team_slave_1 added [ 1046.032399][T15435] device hsr_slave_0 entered promiscuous mode [ 1046.089872][T15435] device hsr_slave_1 entered promiscuous mode [ 1046.154963][T15435] debugfs: Directory 'hsr0' with parent '/' already present! [ 1046.171698][T15435] bridge0: port 2(bridge_slave_1) entered blocking state [ 1046.178824][T15435] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1046.186228][T15435] bridge0: port 1(bridge_slave_0) entered blocking state [ 1046.193273][T15435] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1046.243785][T15435] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1046.262426][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1046.276421][ T2222] bridge0: port 1(bridge_slave_0) entered disabled state [ 1046.284788][ T2222] bridge0: port 2(bridge_slave_1) entered disabled state [ 1046.305407][T15435] 8021q: adding VLAN 0 to HW filter on device team0 [ 1046.322328][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1046.331596][ T3501] bridge0: port 1(bridge_slave_0) entered blocking state [ 1046.338777][ T3501] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1046.362292][ T7206] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1046.372209][ T7206] bridge0: port 2(bridge_slave_1) entered blocking state [ 1046.379328][ T7206] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1046.408868][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1046.423266][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1046.432529][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1046.442654][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1046.451676][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1046.462069][T15435] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1046.499013][T15435] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1046.894091][T15445] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1046.904456][T15445] CPU: 0 PID: 15445 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1046.912398][T15445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1046.922474][T15445] Call Trace: [ 1046.925865][T15445] dump_stack+0xf5/0x159 [ 1046.930143][T15445] dump_header+0xaa/0x449 [ 1046.934686][T15445] oom_kill_process.cold+0x10/0x15 [ 1046.939851][T15445] out_of_memory+0x231/0xa00 [ 1046.944514][T15445] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1046.950217][T15445] mem_cgroup_out_of_memory+0x128/0x150 [ 1046.955811][T15445] memory_max_write+0x17b/0x250 [ 1046.960799][T15445] cgroup_file_write+0x119/0x320 [ 1046.965814][T15445] ? high_work_func+0x30/0x30 [ 1046.970520][T15445] kernfs_fop_write+0x1f4/0x2e0 [ 1046.975462][T15445] ? cgroup_css.part.0+0x90/0x90 [ 1046.980419][T15445] __vfs_write+0x67/0xc0 [ 1046.984759][T15445] ? kernfs_seq_show+0xe0/0xe0 [ 1046.989641][T15445] vfs_write+0x18a/0x390 [ 1046.993974][T15445] ksys_write+0xd5/0x1b0 [ 1046.998279][T15445] __x64_sys_write+0x4c/0x60 [ 1047.002894][T15445] do_syscall_64+0xcc/0x370 [ 1047.007537][T15445] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1047.013437][T15445] RIP: 0033:0x459f39 [ 1047.017363][T15445] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1047.036984][T15445] RSP: 002b:00007f4352f2bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1047.045415][T15445] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1047.053461][T15445] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000b [ 1047.061442][T15445] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1047.069442][T15445] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4352f2c6d4 [ 1047.077425][T15445] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1047.088120][T15445] memory: usage 4672kB, limit 0kB, failcnt 715 [ 1047.094409][T15445] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1047.101453][T15445] Memory cgroup stats for /syz1: [ 1047.101718][T15445] anon 4276224 [ 1047.101718][T15445] file 65536 [ 1047.101718][T15445] kernel_stack 36864 [ 1047.101718][T15445] slab 335872 [ 1047.101718][T15445] sock 0 [ 1047.101718][T15445] shmem 0 [ 1047.101718][T15445] file_mapped 0 [ 1047.101718][T15445] file_dirty 0 [ 1047.101718][T15445] file_writeback 0 [ 1047.101718][T15445] anon_thp 4194304 [ 1047.101718][T15445] inactive_anon 135168 [ 1047.101718][T15445] active_anon 4276224 [ 1047.101718][T15445] inactive_file 0 [ 1047.101718][T15445] active_file 0 [ 1047.101718][T15445] unevictable 135168 [ 1047.101718][T15445] slab_reclaimable 135168 [ 1047.101718][T15445] slab_unreclaimable 200704 [ 1047.101718][T15445] pgfault 56595 [ 1047.101718][T15445] pgmajfault 0 [ 1047.101718][T15445] workingset_refault 0 [ 1047.101718][T15445] workingset_activate 0 [ 1047.101718][T15445] workingset_nodereclaim 0 [ 1047.101718][T15445] pgrefill 269 [ 1047.101718][T15445] pgscan 267 [ 1047.101718][T15445] pgsteal 33 [ 1047.101718][T15445] pgactivate 231 [ 1047.198280][T15445] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=15441,uid=0 [ 1047.213918][T15445] Memory cgroup out of memory: Killed process 15441 (syz-executor.1) total-vm:72852kB, anon-rss:4252kB, file-rss:35824kB, shmem-rss:0kB, UID:0 pgtables:151552kB oom_score_adj:1000 [ 1047.233375][ T1063] oom_reaper: reaped process 15441 (syz-executor.1), now anon-rss:0kB, file-rss:34864kB, shmem-rss:0kB 16:38:23 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:38:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) shutdown(r0, 0x0) 16:38:23 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001a00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x651, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2b8e08cd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xff2, 0x0, 0x8a4, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5c5b, 0x0, 0x7fffffff, 0xc739, 0x0, 0xd95, 0x9, 0x0, 0x0, 0x7fff, 0x0, 0x2, 0x0, 0xf43, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3ff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x73, 0x0, 0x1f], [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1bb40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x374, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [0x0, 0x0, 0x1e342bc1, 0x400, 0x8000, 0x7, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6cba, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xbb2, 0x0, 0x0, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0xab1a, 0x5]}, 0x45c) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 16:38:23 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:38:23 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:38:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_int(r0, 0x0, 0xf, 0x0, &(0x7f0000000140)) [ 1047.911115][T15435] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1047.958895][T15435] CPU: 0 PID: 15435 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1047.966854][T15435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1047.976966][T15435] Call Trace: [ 1047.980289][T15435] dump_stack+0xf5/0x159 [ 1047.984605][T15435] dump_header+0xaa/0x449 [ 1047.988968][T15435] oom_kill_process.cold+0x10/0x15 [ 1047.994215][T15435] out_of_memory+0x231/0xa00 [ 1047.998852][T15435] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1048.004522][T15435] mem_cgroup_out_of_memory+0x128/0x150 [ 1048.010198][T15435] try_charge+0xb3a/0xbc0 [ 1048.014574][T15435] ? rcu_note_context_switch+0x700/0x760 [ 1048.020243][T15435] mem_cgroup_try_charge+0xd2/0x260 [ 1048.025561][T15435] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1048.031302][T15435] wp_page_copy+0x322/0x1160 [ 1048.035928][T15435] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1048.041588][T15435] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1048.047263][T15435] do_wp_page+0x192/0x11f0 [ 1048.051815][T15435] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1048.058176][T15435] __handle_mm_fault+0x1c07/0x2cb0 [ 1048.063421][T15435] handle_mm_fault+0x21b/0x530 [ 1048.068294][T15435] __do_page_fault+0x3fb/0x9e0 [ 1048.073093][T15435] do_page_fault+0x54/0x233 [ 1048.077669][T15435] ? prepare_exit_to_usermode+0x154/0x1a0 [ 1048.083430][T15435] page_fault+0x34/0x40 [ 1048.087597][T15435] RIP: 0033:0x431016 [ 1048.091524][T15435] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 cc 5c 64 00 85 c0 0f 84 [ 1048.111228][T15435] RSP: 002b:00007ffd15edf830 EFLAGS: 00010206 [ 1048.117318][T15435] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1048.125318][T15435] RDX: 00000000016b5930 RSI: 00000000016bd970 RDI: 0000000000000003 [ 1048.133440][T15435] RBP: 0000000000008041 R08: 0000000000000001 R09: 00000000016b4940 [ 1048.141488][T15435] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1048.149565][T15435] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 16:38:24 executing program 5: 16:38:24 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:38:24 executing program 4: [ 1048.334983][T15435] memory: usage 256kB, limit 0kB, failcnt 728 [ 1048.341212][T15435] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1048.461419][T15435] Memory cgroup stats for /syz1: [ 1048.461763][T15435] anon 86016 [ 1048.461763][T15435] file 65536 [ 1048.461763][T15435] kernel_stack 36864 [ 1048.461763][T15435] slab 335872 [ 1048.461763][T15435] sock 0 [ 1048.461763][T15435] shmem 0 [ 1048.461763][T15435] file_mapped 0 [ 1048.461763][T15435] file_dirty 0 [ 1048.461763][T15435] file_writeback 0 [ 1048.461763][T15435] anon_thp 0 [ 1048.461763][T15435] inactive_anon 135168 [ 1048.461763][T15435] active_anon 81920 [ 1048.461763][T15435] inactive_file 0 [ 1048.461763][T15435] active_file 0 [ 1048.461763][T15435] unevictable 135168 [ 1048.461763][T15435] slab_reclaimable 135168 [ 1048.461763][T15435] slab_unreclaimable 200704 [ 1048.461763][T15435] pgfault 56595 [ 1048.461763][T15435] pgmajfault 0 [ 1048.461763][T15435] workingset_refault 0 [ 1048.461763][T15435] workingset_activate 0 [ 1048.461763][T15435] workingset_nodereclaim 0 [ 1048.461763][T15435] pgrefill 269 [ 1048.461763][T15435] pgscan 267 [ 1048.461763][T15435] pgsteal 33 [ 1048.461763][T15435] pgactivate 231 16:38:24 executing program 5: 16:38:24 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001a00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x651, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2b8e08cd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xff2, 0x0, 0x8a4, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5c5b, 0x0, 0x7fffffff, 0xc739, 0x0, 0xd95, 0x9, 0x0, 0x0, 0x7fff, 0x0, 0x2, 0x0, 0xf43, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3ff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x73, 0x0, 0x1f], [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1bb40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x374, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [0x0, 0x0, 0x1e342bc1, 0x400, 0x8000, 0x7, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6cba, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xbb2, 0x0, 0x0, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0xab1a, 0x5]}, 0x45c) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 16:38:24 executing program 4: [ 1048.867333][T15435] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=15435,uid=0 [ 1048.941245][T15435] Memory cgroup out of memory: Killed process 15435 (syz-executor.1) total-vm:72456kB, anon-rss:76kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 [ 1049.021651][ T1063] oom_reaper: reaped process 15435 (syz-executor.1), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 1049.185599][T14662] device bridge_slave_1 left promiscuous mode [ 1049.196467][T14662] bridge0: port 2(bridge_slave_1) entered disabled state [ 1049.285920][T14662] device bridge_slave_0 left promiscuous mode [ 1049.292328][T14662] bridge0: port 1(bridge_slave_0) entered disabled state [ 1050.135503][T14662] device hsr_slave_0 left promiscuous mode [ 1050.185037][T14662] device hsr_slave_1 left promiscuous mode [ 1050.243693][T14662] team0 (unregistering): Port device team_slave_1 removed [ 1050.254777][T14662] team0 (unregistering): Port device team_slave_0 removed [ 1050.265669][T14662] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1050.310113][T14662] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1050.408054][T14662] bond0 (unregistering): Released all slaves 16:38:26 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r10, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r2, 0x0, 0x0) 16:38:26 executing program 5: 16:38:26 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:38:26 executing program 4: [ 1050.574611][T15574] IPVS: ftp: loaded support on port[0] = 21 [ 1050.796600][T15574] chnl_net:caif_netlink_parms(): no params data found [ 1050.872744][T15574] bridge0: port 1(bridge_slave_0) entered blocking state [ 1050.890851][T15574] bridge0: port 1(bridge_slave_0) entered disabled state [ 1050.906160][T15574] device bridge_slave_0 entered promiscuous mode [ 1050.932804][T15574] bridge0: port 2(bridge_slave_1) entered blocking state [ 1050.940017][T15574] bridge0: port 2(bridge_slave_1) entered disabled state [ 1050.948603][T15574] device bridge_slave_1 entered promiscuous mode [ 1050.971902][T15574] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1050.983029][T15574] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1051.006704][T15574] team0: Port device team_slave_0 added [ 1051.013701][T15574] team0: Port device team_slave_1 added [ 1051.078077][T15574] device hsr_slave_0 entered promiscuous mode [ 1051.125381][T15574] device hsr_slave_1 entered promiscuous mode [ 1051.165038][T15574] debugfs: Directory 'hsr0' with parent '/' already present! [ 1051.187489][T15574] bridge0: port 2(bridge_slave_1) entered blocking state [ 1051.194607][T15574] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1051.202005][T15574] bridge0: port 1(bridge_slave_0) entered blocking state [ 1051.209108][T15574] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1051.265270][T15574] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1051.285133][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1051.294003][ T7243] bridge0: port 1(bridge_slave_0) entered disabled state [ 1051.308237][ T7243] bridge0: port 2(bridge_slave_1) entered disabled state [ 1051.327277][T15574] 8021q: adding VLAN 0 to HW filter on device team0 [ 1051.344606][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1051.353747][ T7243] bridge0: port 1(bridge_slave_0) entered blocking state [ 1051.360832][ T7243] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1051.392880][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1051.401903][ T2912] bridge0: port 2(bridge_slave_1) entered blocking state [ 1051.408972][ T2912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1051.425510][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1051.440058][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1051.451143][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1051.467299][T15574] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1051.478731][T15574] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1051.492238][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1051.501986][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1051.511563][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1051.531416][T15574] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1051.915529][T15591] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1051.925894][T15591] CPU: 0 PID: 15591 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1051.933851][T15591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1051.944828][T15591] Call Trace: [ 1051.948150][T15591] dump_stack+0xf5/0x159 [ 1051.952421][T15591] dump_header+0xaa/0x449 [ 1051.956834][T15591] oom_kill_process.cold+0x10/0x15 [ 1051.961985][T15591] out_of_memory+0x231/0xa00 [ 1051.966770][T15591] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1051.972515][T15591] mem_cgroup_out_of_memory+0x128/0x150 [ 1051.978149][T15591] memory_max_write+0x17b/0x250 [ 1051.983031][T15591] cgroup_file_write+0x119/0x320 [ 1051.988020][T15591] ? high_work_func+0x30/0x30 [ 1051.992765][T15591] kernfs_fop_write+0x1f4/0x2e0 [ 1051.997639][T15591] ? cgroup_css.part.0+0x90/0x90 [ 1052.002661][T15591] __vfs_write+0x67/0xc0 [ 1052.006928][T15591] ? kernfs_seq_show+0xe0/0xe0 [ 1052.011957][T15591] vfs_write+0x18a/0x390 [ 1052.016227][T15591] ksys_write+0xd5/0x1b0 [ 1052.020498][T15591] __x64_sys_write+0x4c/0x60 [ 1052.025186][T15591] do_syscall_64+0xcc/0x370 [ 1052.029710][T15591] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1052.035616][T15591] RIP: 0033:0x459f39 [ 1052.039540][T15591] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1052.059183][T15591] RSP: 002b:00007f8944e63c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1052.067627][T15591] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1052.075616][T15591] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000b [ 1052.083596][T15591] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1052.091590][T15591] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8944e646d4 [ 1052.099626][T15591] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1052.109549][T15591] memory: usage 4664kB, limit 0kB, failcnt 640 [ 1052.116032][T15591] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1052.122876][T15591] Memory cgroup stats for /syz3: [ 1052.123129][T15591] anon 4345856 [ 1052.123129][T15591] file 45056 [ 1052.123129][T15591] kernel_stack 36864 [ 1052.123129][T15591] slab 282624 [ 1052.123129][T15591] sock 0 [ 1052.123129][T15591] shmem 0 [ 1052.123129][T15591] file_mapped 0 [ 1052.123129][T15591] file_dirty 135168 [ 1052.123129][T15591] file_writeback 0 [ 1052.123129][T15591] anon_thp 4194304 [ 1052.123129][T15591] inactive_anon 0 [ 1052.123129][T15591] active_anon 4345856 [ 1052.123129][T15591] inactive_file 135168 [ 1052.123129][T15591] active_file 135168 [ 1052.123129][T15591] unevictable 135168 [ 1052.123129][T15591] slab_reclaimable 135168 [ 1052.123129][T15591] slab_unreclaimable 147456 [ 1052.123129][T15591] pgfault 52668 [ 1052.123129][T15591] pgmajfault 0 [ 1052.123129][T15591] workingset_refault 0 [ 1052.123129][T15591] workingset_activate 0 [ 1052.123129][T15591] workingset_nodereclaim 0 [ 1052.123129][T15591] pgrefill 198 [ 1052.123129][T15591] pgscan 198 [ 1052.123129][T15591] pgsteal 0 [ 1052.123129][T15591] pgactivate 198 [ 1052.219920][T15591] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=15588,uid=0 [ 1052.235630][T15591] Memory cgroup out of memory: Killed process 15588 (syz-executor.3) total-vm:72852kB, anon-rss:4192kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:147456kB oom_score_adj:1000 [ 1052.255404][ T1063] oom_reaper: reaped process 15588 (syz-executor.3), now anon-rss:0kB, file-rss:34864kB, shmem-rss:0kB 16:38:28 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r10, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r2, 0x0, 0x0) 16:38:28 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001a00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x651, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2b8e08cd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xff2, 0x0, 0x8a4, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5c5b, 0x0, 0x7fffffff, 0xc739, 0x0, 0xd95, 0x9, 0x0, 0x0, 0x7fff, 0x0, 0x2, 0x0, 0xf43, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3ff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x73, 0x0, 0x1f], [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1bb40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x374, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [0x0, 0x0, 0x1e342bc1, 0x400, 0x8000, 0x7, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6cba, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xbb2, 0x0, 0x0, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0xab1a, 0x5]}, 0x45c) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 16:38:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x73fa052acf5b2705) 16:38:28 executing program 4: mq_unlink(&(0x7f0000000040)='mime_typelotrusted[\x00') 16:38:28 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r10, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r2, 0x0, 0x0) 16:38:28 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1052.888104][T15574] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1052.936483][T15574] CPU: 1 PID: 15574 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1052.944430][T15574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1052.954560][T15574] Call Trace: [ 1052.957881][T15574] dump_stack+0xf5/0x159 [ 1052.962296][T15574] dump_header+0xaa/0x449 [ 1052.966677][T15574] oom_kill_process.cold+0x10/0x15 [ 1052.971825][T15574] out_of_memory+0x231/0xa00 [ 1052.976503][T15574] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1052.982179][T15574] mem_cgroup_out_of_memory+0x128/0x150 [ 1052.987829][T15574] try_charge+0xb3a/0xbc0 [ 1052.992188][T15574] ? rcu_note_context_switch+0x700/0x760 [ 1052.997854][T15574] mem_cgroup_try_charge+0xd2/0x260 [ 1053.003090][T15574] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1053.008759][T15574] wp_page_copy+0x322/0x1160 [ 1053.013371][T15574] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1053.019069][T15574] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1053.024850][T15574] do_wp_page+0x192/0x11f0 [ 1053.029404][T15574] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1053.035140][T15574] __handle_mm_fault+0x1c07/0x2cb0 [ 1053.040403][T15574] handle_mm_fault+0x21b/0x530 [ 1053.045203][T15574] __do_page_fault+0x3fb/0x9e0 [ 1053.050090][T15574] do_page_fault+0x54/0x233 [ 1053.054627][T15574] ? prepare_exit_to_usermode+0x154/0x1a0 [ 1053.060637][T15574] page_fault+0x34/0x40 [ 1053.064817][T15574] RIP: 0033:0x431016 [ 1053.068823][T15574] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 cc 5c 64 00 85 c0 0f 84 [ 1053.088898][T15574] RSP: 002b:00007fff9a59aa10 EFLAGS: 00010206 [ 1053.095000][T15574] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1053.103009][T15574] RDX: 00000000020c3930 RSI: 00000000020cb970 RDI: 0000000000000003 [ 1053.111006][T15574] RBP: 0000000000008041 R08: 0000000000000001 R09: 00000000020c2940 [ 1053.119571][T15574] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1053.128277][T15574] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 16:38:29 executing program 4: rt_sigaction(0x39, 0x0, &(0x7f00000024c0)={0x0, {}, 0x0, 0x0}, 0x8, &(0x7f0000002500)) 16:38:29 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:38:29 executing program 5: msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) [ 1053.315319][T15574] memory: usage 256kB, limit 0kB, failcnt 653 [ 1053.321531][T15574] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1053.374924][T15574] Memory cgroup stats for /syz3: [ 1053.375204][T15574] anon 73728 [ 1053.375204][T15574] file 45056 [ 1053.375204][T15574] kernel_stack 36864 [ 1053.375204][T15574] slab 282624 [ 1053.375204][T15574] sock 0 [ 1053.375204][T15574] shmem 0 [ 1053.375204][T15574] file_mapped 0 [ 1053.375204][T15574] file_dirty 135168 [ 1053.375204][T15574] file_writeback 0 [ 1053.375204][T15574] anon_thp 0 [ 1053.375204][T15574] inactive_anon 0 [ 1053.375204][T15574] active_anon 73728 [ 1053.375204][T15574] inactive_file 135168 [ 1053.375204][T15574] active_file 135168 [ 1053.375204][T15574] unevictable 135168 [ 1053.375204][T15574] slab_reclaimable 135168 [ 1053.375204][T15574] slab_unreclaimable 147456 [ 1053.375204][T15574] pgfault 52668 [ 1053.375204][T15574] pgmajfault 0 [ 1053.375204][T15574] workingset_refault 0 [ 1053.375204][T15574] workingset_activate 0 [ 1053.375204][T15574] workingset_nodereclaim 0 [ 1053.375204][T15574] pgrefill 198 [ 1053.375204][T15574] pgscan 198 [ 1053.375204][T15574] pgsteal 0 [ 1053.375204][T15574] pgactivate 198 16:38:29 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:38:29 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:38:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000280)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'batadv0\x00'}) [ 1053.936199][T15574] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=15574,uid=0 [ 1054.025675][T15574] Memory cgroup out of memory: Killed process 15574 (syz-executor.3) total-vm:72456kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 [ 1054.148752][ T1063] oom_reaper: reaped process 15574 (syz-executor.3), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 1054.649458][T14662] device bridge_slave_1 left promiscuous mode [ 1054.658076][T14662] bridge0: port 2(bridge_slave_1) entered disabled state [ 1054.695951][T14662] device bridge_slave_0 left promiscuous mode [ 1054.702154][T14662] bridge0: port 1(bridge_slave_0) entered disabled state [ 1055.485500][T14662] device hsr_slave_0 left promiscuous mode [ 1055.545100][T14662] device hsr_slave_1 left promiscuous mode [ 1055.593909][T14662] team0 (unregistering): Port device team_slave_1 removed [ 1055.605161][T14662] team0 (unregistering): Port device team_slave_0 removed [ 1055.616043][T14662] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1055.674553][T14662] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1055.764300][T14662] bond0 (unregistering): Released all slaves 16:38:31 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r10, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r2, 0x0, 0x0) 16:38:31 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001a00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x651, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2b8e08cd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xff2, 0x0, 0x8a4, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5c5b, 0x0, 0x7fffffff, 0xc739, 0x0, 0xd95, 0x9, 0x0, 0x0, 0x7fff, 0x0, 0x2, 0x0, 0xf43, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3ff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x73, 0x0, 0x1f], [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1bb40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x374, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [0x0, 0x0, 0x1e342bc1, 0x400, 0x8000, 0x7, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6cba, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xbb2, 0x0, 0x0, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0xab1a, 0x5]}, 0x45c) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 16:38:31 executing program 5: 16:38:31 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1055.882033][T15724] IPVS: ftp: loaded support on port[0] = 21 [ 1056.191358][T15724] chnl_net:caif_netlink_parms(): no params data found [ 1056.242997][T15724] bridge0: port 1(bridge_slave_0) entered blocking state [ 1056.251075][T15724] bridge0: port 1(bridge_slave_0) entered disabled state [ 1056.263609][T15724] device bridge_slave_0 entered promiscuous mode [ 1056.272828][T15724] bridge0: port 2(bridge_slave_1) entered blocking state [ 1056.284126][T15724] bridge0: port 2(bridge_slave_1) entered disabled state [ 1056.293373][T15724] device bridge_slave_1 entered promiscuous mode [ 1056.323611][T15724] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1056.340400][T15724] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1056.369385][T15724] team0: Port device team_slave_0 added [ 1056.380963][T15724] team0: Port device team_slave_1 added [ 1056.468931][T15724] device hsr_slave_0 entered promiscuous mode [ 1056.526479][T15724] device hsr_slave_1 entered promiscuous mode [ 1056.585372][T15724] debugfs: Directory 'hsr0' with parent '/' already present! [ 1056.607171][T15724] bridge0: port 2(bridge_slave_1) entered blocking state [ 1056.614245][T15724] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1056.621701][T15724] bridge0: port 1(bridge_slave_0) entered blocking state [ 1056.628831][T15724] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1056.683539][T15724] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1056.697659][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1056.706302][ T2912] bridge0: port 1(bridge_slave_0) entered disabled state [ 1056.714795][ T2912] bridge0: port 2(bridge_slave_1) entered disabled state [ 1056.732867][T15724] 8021q: adding VLAN 0 to HW filter on device team0 [ 1056.746044][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1056.754689][ T2222] bridge0: port 1(bridge_slave_0) entered blocking state [ 1056.761748][ T2222] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1056.788280][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1056.797699][ T2222] bridge0: port 2(bridge_slave_1) entered blocking state [ 1056.804755][ T2222] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1056.814935][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1056.824356][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1056.833997][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1056.850280][T15724] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1056.861255][T15724] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1056.876179][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1056.885081][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1056.893711][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1056.913389][T15724] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1057.274480][T15742] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1057.290464][T15742] CPU: 0 PID: 15742 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1057.298576][T15742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1057.308636][T15742] Call Trace: [ 1057.311953][T15742] dump_stack+0xf5/0x159 [ 1057.316234][T15742] dump_header+0xaa/0x449 [ 1057.320559][T15742] oom_kill_process.cold+0x10/0x15 [ 1057.325782][T15742] out_of_memory+0x231/0xa00 [ 1057.330453][T15742] ? preempt_schedule_common+0x37/0x90 [ 1057.335952][T15742] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1057.341616][T15742] mem_cgroup_out_of_memory+0x128/0x150 [ 1057.347159][T15742] memory_max_write+0x17b/0x250 [ 1057.352003][T15742] cgroup_file_write+0x119/0x320 [ 1057.356943][T15742] ? high_work_func+0x30/0x30 [ 1057.361686][T15742] kernfs_fop_write+0x1f4/0x2e0 [ 1057.366583][T15742] ? cgroup_css.part.0+0x90/0x90 [ 1057.371539][T15742] __vfs_write+0x67/0xc0 [ 1057.375780][T15742] ? kernfs_seq_show+0xe0/0xe0 [ 1057.380546][T15742] vfs_write+0x18a/0x390 [ 1057.384874][T15742] ksys_write+0xd5/0x1b0 [ 1057.389146][T15742] __x64_sys_write+0x4c/0x60 [ 1057.393731][T15742] do_syscall_64+0xcc/0x370 [ 1057.398247][T15742] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1057.404234][T15742] RIP: 0033:0x459f39 [ 1057.408152][T15742] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1057.428350][T15742] RSP: 002b:00007f525d9ebc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1057.436750][T15742] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1057.444769][T15742] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 1057.452726][T15742] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1057.460687][T15742] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f525d9ec6d4 [ 1057.468663][T15742] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1057.479394][T15742] memory: usage 4696kB, limit 0kB, failcnt 737 [ 1057.485709][T15742] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1057.492623][T15742] Memory cgroup stats for /syz1: [ 1057.492908][T15742] anon 4370432 [ 1057.492908][T15742] file 65536 [ 1057.492908][T15742] kernel_stack 73728 [ 1057.492908][T15742] slab 335872 [ 1057.492908][T15742] sock 0 [ 1057.492908][T15742] shmem 0 [ 1057.492908][T15742] file_mapped 0 [ 1057.492908][T15742] file_dirty 0 [ 1057.492908][T15742] file_writeback 0 [ 1057.492908][T15742] anon_thp 4194304 [ 1057.492908][T15742] inactive_anon 135168 [ 1057.492908][T15742] active_anon 4370432 [ 1057.492908][T15742] inactive_file 0 [ 1057.492908][T15742] active_file 0 [ 1057.492908][T15742] unevictable 135168 [ 1057.492908][T15742] slab_reclaimable 135168 [ 1057.492908][T15742] slab_unreclaimable 200704 [ 1057.492908][T15742] pgfault 56694 [ 1057.492908][T15742] pgmajfault 0 [ 1057.492908][T15742] workingset_refault 0 [ 1057.492908][T15742] workingset_activate 0 [ 1057.492908][T15742] workingset_nodereclaim 0 [ 1057.492908][T15742] pgrefill 269 [ 1057.492908][T15742] pgscan 267 [ 1057.492908][T15742] pgsteal 33 [ 1057.492908][T15742] pgactivate 231 [ 1057.589128][T15742] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=15738,uid=0 [ 1057.604745][T15742] Memory cgroup out of memory: Killed process 15738 (syz-executor.1) total-vm:72852kB, anon-rss:4248kB, file-rss:35824kB, shmem-rss:0kB, UID:0 pgtables:159744kB oom_score_adj:1000 [ 1057.624600][ T1063] oom_reaper: reaped process 15738 (syz-executor.1), now anon-rss:0kB, file-rss:34864kB, shmem-rss:0kB 16:38:34 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r10, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r2, 0x0, 0x0) 16:38:34 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:38:34 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001a00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x651, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2b8e08cd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xff2, 0x0, 0x8a4, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5c5b, 0x0, 0x7fffffff, 0xc739, 0x0, 0xd95, 0x9, 0x0, 0x0, 0x7fff, 0x0, 0x2, 0x0, 0xf43, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3ff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x73, 0x0, 0x1f], [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1bb40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x374, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [0x0, 0x0, 0x1e342bc1, 0x400, 0x8000, 0x7, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6cba, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xbb2, 0x0, 0x0, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0xab1a, 0x5]}, 0x45c) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 16:38:34 executing program 5: 16:38:34 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r10, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r2, 0x0, 0x0) [ 1058.251312][T15724] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1058.261497][T15724] CPU: 0 PID: 15724 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1058.269463][T15724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1058.279754][T15724] Call Trace: [ 1058.283078][T15724] dump_stack+0xf5/0x159 [ 1058.287370][T15724] dump_header+0xaa/0x449 [ 1058.291801][T15724] oom_kill_process.cold+0x10/0x15 [ 1058.297165][T15724] out_of_memory+0x231/0xa00 16:38:34 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1058.301778][T15724] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1058.307541][T15724] mem_cgroup_out_of_memory+0x128/0x150 [ 1058.313125][T15724] try_charge+0xb3a/0xbc0 [ 1058.317486][T15724] ? rcu_note_context_switch+0x700/0x760 [ 1058.323188][T15724] mem_cgroup_try_charge+0xd2/0x260 [ 1058.328512][T15724] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1058.334265][T15724] wp_page_copy+0x322/0x1160 [ 1058.338936][T15724] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1058.344593][T15724] ? __kcsan_setup_watchpoint+0x6b/0x4a0 16:38:34 executing program 5: [ 1058.350265][T15724] do_wp_page+0x192/0x11f0 [ 1058.355346][T15724] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1058.361060][T15724] __handle_mm_fault+0x1c07/0x2cb0 [ 1058.366342][T15724] handle_mm_fault+0x21b/0x530 [ 1058.371162][T15724] __do_page_fault+0x3fb/0x9e0 [ 1058.376043][T15724] do_page_fault+0x54/0x233 [ 1058.380605][T15724] ? prepare_exit_to_usermode+0x154/0x1a0 [ 1058.386361][T15724] page_fault+0x34/0x40 [ 1058.390608][T15724] RIP: 0033:0x431016 [ 1058.394553][T15724] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 cc 5c 64 00 85 c0 0f 84 [ 1058.414179][T15724] RSP: 002b:00007ffc671fd220 EFLAGS: 00010206 [ 1058.420284][T15724] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1058.428292][T15724] RDX: 0000000002631930 RSI: 0000000002639970 RDI: 0000000000000003 [ 1058.436305][T15724] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002630940 [ 1058.444295][T15724] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1058.452295][T15724] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 [ 1058.465305][T15724] memory: usage 276kB, limit 0kB, failcnt 750 [ 1058.471430][T15724] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1058.544291][T15724] Memory cgroup stats for /syz1: [ 1058.544571][T15724] anon 65536 [ 1058.544571][T15724] file 65536 [ 1058.544571][T15724] kernel_stack 36864 [ 1058.544571][T15724] slab 335872 [ 1058.544571][T15724] sock 0 [ 1058.544571][T15724] shmem 0 [ 1058.544571][T15724] file_mapped 0 [ 1058.544571][T15724] file_dirty 0 [ 1058.544571][T15724] file_writeback 0 [ 1058.544571][T15724] anon_thp 0 [ 1058.544571][T15724] inactive_anon 135168 [ 1058.544571][T15724] active_anon 45056 [ 1058.544571][T15724] inactive_file 0 [ 1058.544571][T15724] active_file 0 [ 1058.544571][T15724] unevictable 135168 [ 1058.544571][T15724] slab_reclaimable 135168 [ 1058.544571][T15724] slab_unreclaimable 200704 [ 1058.544571][T15724] pgfault 56694 [ 1058.544571][T15724] pgmajfault 0 [ 1058.544571][T15724] workingset_refault 0 [ 1058.544571][T15724] workingset_activate 0 [ 1058.544571][T15724] workingset_nodereclaim 0 [ 1058.544571][T15724] pgrefill 269 [ 1058.544571][T15724] pgscan 267 [ 1058.544571][T15724] pgsteal 33 [ 1058.544571][T15724] pgactivate 231 16:38:34 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001a00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x651, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2b8e08cd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xff2, 0x0, 0x8a4, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5c5b, 0x0, 0x7fffffff, 0xc739, 0x0, 0xd95, 0x9, 0x0, 0x0, 0x7fff, 0x0, 0x2, 0x0, 0xf43, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3ff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x73, 0x0, 0x1f], [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1bb40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x374, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [0x0, 0x0, 0x1e342bc1, 0x400, 0x8000, 0x7, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6cba, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xbb2, 0x0, 0x0, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0xab1a, 0x5]}, 0x45c) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 16:38:34 executing program 5: 16:38:34 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:38:34 executing program 5: 16:38:34 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001a00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x651, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2b8e08cd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xff2, 0x0, 0x8a4, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5c5b, 0x0, 0x7fffffff, 0xc739, 0x0, 0xd95, 0x9, 0x0, 0x0, 0x7fff, 0x0, 0x2, 0x0, 0xf43, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3ff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x73, 0x0, 0x1f], [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1bb40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x374, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [0x0, 0x0, 0x1e342bc1, 0x400, 0x8000, 0x7, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6cba, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xbb2, 0x0, 0x0, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0xab1a, 0x5]}, 0x45c) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 1059.155702][T14662] device bridge_slave_1 left promiscuous mode [ 1059.162130][T14662] bridge0: port 2(bridge_slave_1) entered disabled state [ 1059.225852][T14662] device bridge_slave_0 left promiscuous mode [ 1059.245650][T14662] bridge0: port 1(bridge_slave_0) entered disabled state [ 1059.407223][T15724] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=15724,uid=0 [ 1059.465117][T15724] Memory cgroup out of memory: Killed process 15724 (syz-executor.1) total-vm:72456kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:0 [ 1059.521226][ T1063] oom_reaper: reaped process 15724 (syz-executor.1), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 1060.435319][T14662] device hsr_slave_0 left promiscuous mode [ 1060.475073][T14662] device hsr_slave_1 left promiscuous mode [ 1060.523986][T14662] team0 (unregistering): Port device team_slave_1 removed [ 1060.536010][T14662] team0 (unregistering): Port device team_slave_0 removed [ 1060.547094][T14662] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1060.589223][T14662] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1060.671451][T14662] bond0 (unregistering): Released all slaves 16:38:36 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:38:36 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:38:36 executing program 5: 16:38:36 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001a00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x651, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2b8e08cd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xff2, 0x0, 0x8a4, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5c5b, 0x0, 0x7fffffff, 0xc739, 0x0, 0xd95, 0x9, 0x0, 0x0, 0x7fff, 0x0, 0x2, 0x0, 0xf43, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3ff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x73, 0x0, 0x1f], [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1bb40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x374, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [0x0, 0x0, 0x1e342bc1, 0x400, 0x8000, 0x7, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6cba, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xbb2, 0x0, 0x0, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0xab1a, 0x5]}, 0x45c) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 1061.010856][T15773] IPVS: ftp: loaded support on port[0] = 21 [ 1061.330909][T15773] chnl_net:caif_netlink_parms(): no params data found [ 1061.456880][T15773] bridge0: port 1(bridge_slave_0) entered blocking state [ 1061.472849][T15773] bridge0: port 1(bridge_slave_0) entered disabled state [ 1061.481539][T15773] device bridge_slave_0 entered promiscuous mode [ 1061.490079][T15773] bridge0: port 2(bridge_slave_1) entered blocking state [ 1061.505024][T15773] bridge0: port 2(bridge_slave_1) entered disabled state [ 1061.522081][T15773] device bridge_slave_1 entered promiscuous mode [ 1061.562586][T15773] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1061.585731][T15773] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1061.641347][T15773] team0: Port device team_slave_0 added [ 1061.657209][T15773] team0: Port device team_slave_1 added [ 1061.731730][T15773] device hsr_slave_0 entered promiscuous mode [ 1061.785449][T15773] device hsr_slave_1 entered promiscuous mode [ 1061.824995][T15773] debugfs: Directory 'hsr0' with parent '/' already present! [ 1061.890054][T15773] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1061.902825][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1061.911607][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1061.922058][T15773] 8021q: adding VLAN 0 to HW filter on device team0 [ 1061.933268][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1061.942800][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1061.951784][ T2222] bridge0: port 1(bridge_slave_0) entered blocking state [ 1061.958972][ T2222] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1061.976017][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1061.984239][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1061.993265][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1062.004395][ T3501] bridge0: port 2(bridge_slave_1) entered blocking state [ 1062.011489][ T3501] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1062.020176][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1062.029516][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1062.046566][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1062.055740][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1062.064819][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1062.074310][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1062.083210][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1062.091784][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1062.100222][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1062.109005][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1062.118121][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1062.129155][T15773] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1062.149340][T15773] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1062.543683][T15791] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1062.554048][T15791] CPU: 0 PID: 15791 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1062.561947][T15791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1062.572019][T15791] Call Trace: [ 1062.575333][T15791] dump_stack+0xf5/0x159 [ 1062.579800][T15791] dump_header+0xaa/0x449 [ 1062.584174][T15791] oom_kill_process.cold+0x10/0x15 [ 1062.589313][T15791] out_of_memory+0x231/0xa00 [ 1062.593922][T15791] ? preempt_schedule_common+0x37/0x90 [ 1062.599703][T15791] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1062.605389][T15791] mem_cgroup_out_of_memory+0x128/0x150 [ 1062.610979][T15791] memory_max_write+0x17b/0x250 [ 1062.615861][T15791] cgroup_file_write+0x119/0x320 [ 1062.620858][T15791] ? high_work_func+0x30/0x30 [ 1062.625562][T15791] kernfs_fop_write+0x1f4/0x2e0 [ 1062.630445][T15791] ? cgroup_css.part.0+0x90/0x90 [ 1062.635403][T15791] __vfs_write+0x67/0xc0 [ 1062.639773][T15791] ? kernfs_seq_show+0xe0/0xe0 [ 1062.644557][T15791] vfs_write+0x18a/0x390 [ 1062.648883][T15791] ksys_write+0xd5/0x1b0 [ 1062.653150][T15791] __x64_sys_write+0x4c/0x60 [ 1062.657771][T15791] do_syscall_64+0xcc/0x370 [ 1062.662356][T15791] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1062.668257][T15791] RIP: 0033:0x459f39 [ 1062.672183][T15791] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1062.691898][T15791] RSP: 002b:00007f5dea2d0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1062.700336][T15791] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1062.708321][T15791] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 1062.716428][T15791] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1062.724414][T15791] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5dea2d16d4 [ 1062.732421][T15791] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1062.743073][T15791] memory: usage 4668kB, limit 0kB, failcnt 662 [ 1062.749488][T15791] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1062.756463][T15791] Memory cgroup stats for /syz3: [ 1062.756806][T15791] anon 4358144 [ 1062.756806][T15791] file 45056 [ 1062.756806][T15791] kernel_stack 73728 [ 1062.756806][T15791] slab 282624 [ 1062.756806][T15791] sock 0 [ 1062.756806][T15791] shmem 0 [ 1062.756806][T15791] file_mapped 0 [ 1062.756806][T15791] file_dirty 135168 [ 1062.756806][T15791] file_writeback 0 [ 1062.756806][T15791] anon_thp 4194304 [ 1062.756806][T15791] inactive_anon 0 [ 1062.756806][T15791] active_anon 4358144 [ 1062.756806][T15791] inactive_file 135168 [ 1062.756806][T15791] active_file 135168 [ 1062.756806][T15791] unevictable 135168 [ 1062.756806][T15791] slab_reclaimable 135168 [ 1062.756806][T15791] slab_unreclaimable 147456 [ 1062.756806][T15791] pgfault 52734 [ 1062.756806][T15791] pgmajfault 0 [ 1062.756806][T15791] workingset_refault 0 [ 1062.756806][T15791] workingset_activate 0 [ 1062.756806][T15791] workingset_nodereclaim 0 [ 1062.756806][T15791] pgrefill 198 [ 1062.756806][T15791] pgscan 198 [ 1062.756806][T15791] pgsteal 0 [ 1062.756806][T15791] pgactivate 198 [ 1062.859236][T15791] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=15788,uid=0 [ 1062.876184][T15791] Memory cgroup out of memory: Killed process 15788 (syz-executor.3) total-vm:72852kB, anon-rss:4244kB, file-rss:35824kB, shmem-rss:0kB, UID:0 pgtables:151552kB oom_score_adj:1000 [ 1062.897027][ T1063] oom_reaper: reaped process 15788 (syz-executor.3), now anon-rss:0kB, file-rss:34864kB, shmem-rss:0kB 16:38:39 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:38:39 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:38:39 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001a00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x651, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2b8e08cd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xff2, 0x0, 0x8a4, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5c5b, 0x0, 0x7fffffff, 0xc739, 0x0, 0xd95, 0x9, 0x0, 0x0, 0x7fff, 0x0, 0x2, 0x0, 0xf43, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3ff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x73, 0x0, 0x1f], [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1bb40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x374, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [0x0, 0x0, 0x1e342bc1, 0x400, 0x8000, 0x7, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6cba, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xbb2, 0x0, 0x0, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0xab1a, 0x5]}, 0x45c) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 16:38:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioprio_set$uid(0x3, 0x0, 0x0) 16:38:39 executing program 4: r0 = socket$packet(0x11, 0x4000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x45, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) 16:38:39 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1063.500314][T15773] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1063.550288][T15773] CPU: 0 PID: 15773 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1063.558771][T15773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1063.568839][T15773] Call Trace: [ 1063.572261][T15773] dump_stack+0xf5/0x159 [ 1063.577281][T15773] dump_header+0xaa/0x449 [ 1063.581682][T15773] oom_kill_process.cold+0x10/0x15 [ 1063.586915][T15773] out_of_memory+0x231/0xa00 [ 1063.591586][T15773] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1063.597319][T15773] mem_cgroup_out_of_memory+0x128/0x150 [ 1063.602887][T15773] try_charge+0xb3a/0xbc0 [ 1063.607295][T15773] ? rcu_note_context_switch+0x700/0x760 [ 1063.612998][T15773] mem_cgroup_try_charge+0xd2/0x260 [ 1063.618293][T15773] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1063.623942][T15773] wp_page_copy+0x322/0x1160 [ 1063.628576][T15773] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1063.634273][T15773] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1063.639936][T15773] do_wp_page+0x192/0x11f0 [ 1063.644368][T15773] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1063.650075][T15773] __handle_mm_fault+0x1c07/0x2cb0 [ 1063.655259][T15773] handle_mm_fault+0x21b/0x530 [ 1063.660042][T15773] __do_page_fault+0x3fb/0x9e0 [ 1063.664862][T15773] do_page_fault+0x54/0x233 [ 1063.669387][T15773] ? prepare_exit_to_usermode+0x154/0x1a0 [ 1063.675649][T15773] page_fault+0x34/0x40 [ 1063.679824][T15773] RIP: 0033:0x431016 [ 1063.683740][T15773] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 cc 5c 64 00 85 c0 0f 84 [ 1063.703362][T15773] RSP: 002b:00007ffe6c9e9620 EFLAGS: 00010206 [ 1063.709433][T15773] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1063.717408][T15773] RDX: 00000000029d5930 RSI: 00000000029dd970 RDI: 0000000000000003 [ 1063.725384][T15773] RBP: 0000000000008041 R08: 0000000000000001 R09: 00000000029d4940 [ 1063.733446][T15773] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1063.741419][T15773] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 [ 1063.749948][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1063.755746][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1063.804983][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1063.804994][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1063.805030][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1063.810793][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1063.816572][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1063.822281][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1063.828890][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1063.834584][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1063.945017][T15773] memory: usage 252kB, limit 0kB, failcnt 675 [ 1063.951145][T15773] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 16:38:39 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:38:39 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) tee(r0, 0xffffffffffffffff, 0x2, 0x0) [ 1063.991136][T15773] Memory cgroup stats for /syz3: [ 1063.991456][T15773] anon 126976 [ 1063.991456][T15773] file 45056 [ 1063.991456][T15773] kernel_stack 0 [ 1063.991456][T15773] slab 282624 [ 1063.991456][T15773] sock 0 [ 1063.991456][T15773] shmem 0 [ 1063.991456][T15773] file_mapped 0 [ 1063.991456][T15773] file_dirty 135168 [ 1063.991456][T15773] file_writeback 0 [ 1063.991456][T15773] anon_thp 0 [ 1063.991456][T15773] inactive_anon 0 [ 1063.991456][T15773] active_anon 122880 [ 1063.991456][T15773] inactive_file 135168 16:38:39 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001a00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x651, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2b8e08cd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xff2, 0x0, 0x8a4, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5c5b, 0x0, 0x7fffffff, 0xc739, 0x0, 0xd95, 0x9, 0x0, 0x0, 0x7fff, 0x0, 0x2, 0x0, 0xf43, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3ff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x73, 0x0, 0x1f], [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1bb40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x374, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [0x0, 0x0, 0x1e342bc1, 0x400, 0x8000, 0x7, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6cba, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xbb2, 0x0, 0x0, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0xab1a, 0x5]}, 0x45c) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 1063.991456][T15773] active_file 135168 [ 1063.991456][T15773] unevictable 135168 [ 1063.991456][T15773] slab_reclaimable 135168 [ 1063.991456][T15773] slab_unreclaimable 147456 [ 1063.991456][T15773] pgfault 52734 [ 1063.991456][T15773] pgmajfault 0 [ 1063.991456][T15773] workingset_refault 0 [ 1063.991456][T15773] workingset_activate 0 [ 1063.991456][T15773] workingset_nodereclaim 0 [ 1063.991456][T15773] pgrefill 198 [ 1063.991456][T15773] pgscan 198 [ 1063.991456][T15773] pgsteal 0 [ 1063.991456][T15773] pgactivate 198 16:38:40 executing program 4: vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) 16:38:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 16:38:40 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001a00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x651, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2b8e08cd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xff2, 0x0, 0x8a4, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5c5b, 0x0, 0x7fffffff, 0xc739, 0x0, 0xd95, 0x9, 0x0, 0x0, 0x7fff, 0x0, 0x2, 0x0, 0xf43, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3ff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x73, 0x0, 0x1f], [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1bb40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x374, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [0x0, 0x0, 0x1e342bc1, 0x400, 0x8000, 0x7, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6cba, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xbb2, 0x0, 0x0, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0xab1a, 0x5]}, 0x45c) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 1064.465469][T15773] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=15773,uid=0 [ 1064.516245][T15773] Memory cgroup out of memory: Killed process 15773 (syz-executor.3) total-vm:72456kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 [ 1064.600842][ T1063] oom_reaper: reaped process 15773 (syz-executor.3), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 1065.089133][T14662] device bridge_slave_1 left promiscuous mode [ 1065.096738][T14662] bridge0: port 2(bridge_slave_1) entered disabled state [ 1065.145818][T14662] device bridge_slave_0 left promiscuous mode [ 1065.152165][T14662] bridge0: port 1(bridge_slave_0) entered disabled state [ 1065.945285][T14662] device hsr_slave_0 left promiscuous mode [ 1065.995425][T14662] device hsr_slave_1 left promiscuous mode [ 1066.043977][T14662] team0 (unregistering): Port device team_slave_1 removed [ 1066.055137][T14662] team0 (unregistering): Port device team_slave_0 removed [ 1066.065992][T14662] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1066.120061][T14662] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1066.219225][T14662] bond0 (unregistering): Released all slaves [ 1066.336861][T15826] IPVS: ftp: loaded support on port[0] = 21 [ 1066.425817][T15826] chnl_net:caif_netlink_parms(): no params data found [ 1066.503643][T15826] bridge0: port 1(bridge_slave_0) entered blocking state [ 1066.514603][T15826] bridge0: port 1(bridge_slave_0) entered disabled state [ 1066.524317][T15826] device bridge_slave_0 entered promiscuous mode [ 1066.536638][T15826] bridge0: port 2(bridge_slave_1) entered blocking state [ 1066.543792][T15826] bridge0: port 2(bridge_slave_1) entered disabled state [ 1066.556457][T15826] device bridge_slave_1 entered promiscuous mode [ 1066.583374][T15826] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1066.599270][T15826] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1066.626121][T15826] team0: Port device team_slave_0 added [ 1066.633201][T15826] team0: Port device team_slave_1 added [ 1066.708124][T15826] device hsr_slave_0 entered promiscuous mode [ 1066.765374][T15826] device hsr_slave_1 entered promiscuous mode [ 1066.824970][T15826] debugfs: Directory 'hsr0' with parent '/' already present! [ 1066.846747][T15826] bridge0: port 2(bridge_slave_1) entered blocking state [ 1066.853943][T15826] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1066.861352][T15826] bridge0: port 1(bridge_slave_0) entered blocking state [ 1066.868546][T15826] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1066.923233][T15826] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1066.942462][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1066.951749][ T4362] bridge0: port 1(bridge_slave_0) entered disabled state [ 1066.965260][ T4362] bridge0: port 2(bridge_slave_1) entered disabled state [ 1066.985781][T15826] 8021q: adding VLAN 0 to HW filter on device team0 [ 1067.002642][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1067.011803][ T7243] bridge0: port 1(bridge_slave_0) entered blocking state [ 1067.018903][ T7243] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1067.041694][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1067.055485][ T2912] bridge0: port 2(bridge_slave_1) entered blocking state [ 1067.062564][ T2912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1067.087606][ T7206] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1067.096960][ T7206] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1067.106325][ T7206] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1067.114859][ T7206] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1067.127354][T15826] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1067.143528][T15826] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1067.153247][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1067.183607][T15826] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1067.558986][T15836] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1067.574572][T15836] CPU: 1 PID: 15836 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1067.582501][T15836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1067.592615][T15836] Call Trace: [ 1067.595932][T15836] dump_stack+0xf5/0x159 [ 1067.600269][T15836] dump_header+0xaa/0x449 [ 1067.604628][T15836] oom_kill_process.cold+0x10/0x15 [ 1067.609802][T15836] out_of_memory+0x231/0xa00 [ 1067.614409][T15836] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1067.620080][T15836] mem_cgroup_out_of_memory+0x128/0x150 [ 1067.625661][T15836] memory_max_write+0x17b/0x250 [ 1067.630568][T15836] cgroup_file_write+0x119/0x320 [ 1067.635603][T15836] ? high_work_func+0x30/0x30 [ 1067.640308][T15836] kernfs_fop_write+0x1f4/0x2e0 [ 1067.645199][T15836] ? cgroup_css.part.0+0x90/0x90 [ 1067.650161][T15836] __vfs_write+0x67/0xc0 [ 1067.654427][T15836] ? kernfs_seq_show+0xe0/0xe0 [ 1067.659283][T15836] vfs_write+0x18a/0x390 [ 1067.663548][T15836] ksys_write+0xd5/0x1b0 [ 1067.667878][T15836] __x64_sys_write+0x4c/0x60 [ 1067.672492][T15836] do_syscall_64+0xcc/0x370 [ 1067.677032][T15836] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1067.682924][T15836] RIP: 0033:0x459f39 [ 1067.686942][T15836] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1067.706557][T15836] RSP: 002b:00007f55369b1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1067.714988][T15836] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1067.723312][T15836] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000b [ 1067.731298][T15836] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1067.739321][T15836] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55369b26d4 [ 1067.747311][T15836] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1067.760147][T15836] memory: usage 4676kB, limit 0kB, failcnt 759 [ 1067.766419][T15836] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1067.773302][T15836] Memory cgroup stats for /syz1: [ 1067.773482][T15836] anon 4333568 [ 1067.773482][T15836] file 65536 [ 1067.773482][T15836] kernel_stack 36864 [ 1067.773482][T15836] slab 200704 [ 1067.773482][T15836] sock 0 [ 1067.773482][T15836] shmem 0 [ 1067.773482][T15836] file_mapped 0 [ 1067.773482][T15836] file_dirty 0 [ 1067.773482][T15836] file_writeback 0 [ 1067.773482][T15836] anon_thp 4194304 [ 1067.773482][T15836] inactive_anon 135168 [ 1067.773482][T15836] active_anon 4333568 [ 1067.773482][T15836] inactive_file 0 [ 1067.773482][T15836] active_file 0 [ 1067.773482][T15836] unevictable 135168 [ 1067.773482][T15836] slab_reclaimable 135168 [ 1067.773482][T15836] slab_unreclaimable 65536 [ 1067.773482][T15836] pgfault 56760 [ 1067.773482][T15836] pgmajfault 0 [ 1067.773482][T15836] workingset_refault 0 [ 1067.773482][T15836] workingset_activate 0 [ 1067.773482][T15836] workingset_nodereclaim 0 [ 1067.773482][T15836] pgrefill 269 [ 1067.773482][T15836] pgscan 267 [ 1067.773482][T15836] pgsteal 33 [ 1067.773482][T15836] pgactivate 231 [ 1067.869661][T15836] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=15833,uid=0 [ 1067.885975][T15836] Memory cgroup out of memory: Killed process 15833 (syz-executor.1) total-vm:72852kB, anon-rss:4244kB, file-rss:35824kB, shmem-rss:0kB, UID:0 pgtables:151552kB oom_score_adj:1000 [ 1067.906599][ T1063] oom_reaper: reaped process 15833 (syz-executor.1), now anon-rss:0kB, file-rss:34864kB, shmem-rss:0kB 16:38:44 executing program 4: r0 = socket$kcm(0x2, 0x20000000002, 0x73) recvmsg$kcm(r0, 0x0, 0x100) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r1, 0x0, 0x0}, 0x20) bpf$OBJ_PIN_MAP(0x6, 0x0, 0xbcd8781b067b5e83) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f00000004c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000c80)=[{0x0}, {&(0x7f0000000740)=""/146, 0x92}, {0x0}, {&(0x7f00000008c0)=""/223, 0xdf}, {&(0x7f0000000ac0)=""/243, 0xf3}, {&(0x7f0000000bc0)=""/144, 0x90}], 0x6}, 0x40) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="51c880468e1dfd03d49064c7429eb875848580fe8b627a2ab60000000000"], 0x1e) write$cgroup_pid(r4, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)=0x1000) write$cgroup_pid(r4, &(0x7f0000000000), 0xfffffea6) 16:38:44 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:38:44 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001a00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x651, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2b8e08cd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xff2, 0x0, 0x8a4, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5c5b, 0x0, 0x7fffffff, 0xc739, 0x0, 0xd95, 0x9, 0x0, 0x0, 0x7fff, 0x0, 0x2, 0x0, 0xf43, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3ff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x73, 0x0, 0x1f], [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1bb40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x374, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [0x0, 0x0, 0x1e342bc1, 0x400, 0x8000, 0x7, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6cba, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xbb2, 0x0, 0x0, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0xab1a, 0x5]}, 0x45c) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 16:38:44 executing program 5: 16:38:44 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:38:44 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) [ 1068.583983][T15826] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1068.615246][T15826] CPU: 1 PID: 15826 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1068.623241][T15826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1068.633302][T15826] Call Trace: [ 1068.636621][T15826] dump_stack+0xf5/0x159 [ 1068.640894][T15826] dump_header+0xaa/0x449 [ 1068.645286][T15826] oom_kill_process.cold+0x10/0x15 [ 1068.650441][T15826] out_of_memory+0x231/0xa00 [ 1068.655054][T15826] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1068.660725][T15826] mem_cgroup_out_of_memory+0x128/0x150 [ 1068.666310][T15826] try_charge+0xb3a/0xbc0 [ 1068.670686][T15826] ? rcu_note_context_switch+0x700/0x760 [ 1068.676366][T15826] mem_cgroup_try_charge+0xd2/0x260 [ 1068.681594][T15826] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1068.687327][T15826] __handle_mm_fault+0x179a/0x2cb0 [ 1068.692491][T15826] handle_mm_fault+0x21b/0x530 [ 1068.697288][T15826] __do_page_fault+0x3fb/0x9e0 [ 1068.702105][T15826] do_page_fault+0x54/0x233 [ 1068.706672][T15826] ? do_syscall_64+0x270/0x370 [ 1068.711476][T15826] page_fault+0x34/0x40 [ 1068.715646][T15826] RIP: 0033:0x403a42 16:38:44 executing program 5: [ 1068.719574][T15826] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 19 8f 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 39 44 05 00 48 [ 1068.739198][T15826] RSP: 002b:00007ffdbef09e80 EFLAGS: 00010246 [ 1068.745326][T15826] RAX: 0000000000000000 RBX: 0000000000104a07 RCX: 00000000004139f0 [ 1068.753347][T15826] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffdbef0afb0 [ 1068.761493][T15826] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000000001be1940 [ 1068.769510][T15826] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdbef0afb0 [ 1068.777499][T15826] R13: 00007ffdbef0afa0 R14: 0000000000000000 R15: 00007ffdbef0afb0 16:38:44 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001a00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x651, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2b8e08cd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xff2, 0x0, 0x8a4, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5c5b, 0x0, 0x7fffffff, 0xc739, 0x0, 0xd95, 0x9, 0x0, 0x0, 0x7fff, 0x0, 0x2, 0x0, 0xf43, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3ff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x73, 0x0, 0x1f], [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1bb40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x374, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [0x0, 0x0, 0x1e342bc1, 0x400, 0x8000, 0x7, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6cba, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xbb2, 0x0, 0x0, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0xab1a, 0x5]}, 0x45c) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r0, 0x0, 0x0) 16:38:44 executing program 4: 16:38:44 executing program 5: 16:38:44 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1068.964943][T15826] memory: usage 260kB, limit 0kB, failcnt 772 [ 1068.984958][T15826] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1069.022313][T15826] Memory cgroup stats for /syz1: [ 1069.022609][T15826] anon 40960 [ 1069.022609][T15826] file 65536 [ 1069.022609][T15826] kernel_stack 36864 [ 1069.022609][T15826] slab 200704 [ 1069.022609][T15826] sock 0 [ 1069.022609][T15826] shmem 0 [ 1069.022609][T15826] file_mapped 0 [ 1069.022609][T15826] file_dirty 0 [ 1069.022609][T15826] file_writeback 0 [ 1069.022609][T15826] anon_thp 0 [ 1069.022609][T15826] inactive_anon 135168 [ 1069.022609][T15826] active_anon 40960 [ 1069.022609][T15826] inactive_file 0 [ 1069.022609][T15826] active_file 0 [ 1069.022609][T15826] unevictable 135168 [ 1069.022609][T15826] slab_reclaimable 135168 [ 1069.022609][T15826] slab_unreclaimable 65536 [ 1069.022609][T15826] pgfault 56760 [ 1069.022609][T15826] pgmajfault 0 [ 1069.022609][T15826] workingset_refault 0 [ 1069.022609][T15826] workingset_activate 0 [ 1069.022609][T15826] workingset_nodereclaim 0 [ 1069.022609][T15826] pgrefill 269 [ 1069.022609][T15826] pgscan 267 [ 1069.022609][T15826] pgsteal 33 [ 1069.022609][T15826] pgactivate 231 [ 1069.326434][T14662] device bridge_slave_1 left promiscuous mode [ 1069.343173][T14662] bridge0: port 2(bridge_slave_1) entered disabled state 16:38:45 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001a00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x651, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2b8e08cd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xff2, 0x0, 0x8a4, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5c5b, 0x0, 0x7fffffff, 0xc739, 0x0, 0xd95, 0x9, 0x0, 0x0, 0x7fff, 0x0, 0x2, 0x0, 0xf43, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3ff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x73, 0x0, 0x1f], [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1bb40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x374, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [0x0, 0x0, 0x1e342bc1, 0x400, 0x8000, 0x7, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6cba, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xbb2, 0x0, 0x0, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0xab1a, 0x5]}, 0x45c) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r0, 0x0, 0x0) [ 1069.415921][T14662] device bridge_slave_0 left promiscuous mode [ 1069.422323][T14662] bridge0: port 1(bridge_slave_0) entered disabled state 16:38:45 executing program 4: 16:38:45 executing program 5: 16:38:45 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1069.706767][T15826] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=15826,uid=0 16:38:45 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001a00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x651, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2b8e08cd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xff2, 0x0, 0x8a4, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5c5b, 0x0, 0x7fffffff, 0xc739, 0x0, 0xd95, 0x9, 0x0, 0x0, 0x7fff, 0x0, 0x2, 0x0, 0xf43, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3ff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x73, 0x0, 0x1f], [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1bb40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x374, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [0x0, 0x0, 0x1e342bc1, 0x400, 0x8000, 0x7, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6cba, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xbb2, 0x0, 0x0, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0xab1a, 0x5]}, 0x45c) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r0, 0x0, 0x0) [ 1069.792049][T15826] Memory cgroup out of memory: Killed process 15826 (syz-executor.1) total-vm:72456kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 [ 1069.901353][ T1063] oom_reaper: reaped process 15826 (syz-executor.1), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 1071.115603][T14662] device hsr_slave_0 left promiscuous mode [ 1071.175155][T14662] device hsr_slave_1 left promiscuous mode [ 1071.222719][T14662] team0 (unregistering): Port device team_slave_1 removed [ 1071.233869][T14662] team0 (unregistering): Port device team_slave_0 removed [ 1071.245071][T14662] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1071.290674][T14662] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1071.371919][T14662] bond0 (unregistering): Released all slaves 16:38:47 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) [ 1071.736923][T15975] IPVS: ftp: loaded support on port[0] = 21 [ 1071.846706][T15975] chnl_net:caif_netlink_parms(): no params data found [ 1071.892631][T15975] bridge0: port 1(bridge_slave_0) entered blocking state [ 1071.904411][T15975] bridge0: port 1(bridge_slave_0) entered disabled state [ 1071.912583][T15975] device bridge_slave_0 entered promiscuous mode [ 1071.925112][T15975] bridge0: port 2(bridge_slave_1) entered blocking state [ 1071.932243][T15975] bridge0: port 2(bridge_slave_1) entered disabled state [ 1071.944657][T15975] device bridge_slave_1 entered promiscuous mode [ 1071.972950][T15975] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1071.988771][T15975] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1072.018918][T15975] team0: Port device team_slave_0 added [ 1072.028304][T15975] team0: Port device team_slave_1 added [ 1072.147985][T15975] device hsr_slave_0 entered promiscuous mode [ 1072.199657][T15975] device hsr_slave_1 entered promiscuous mode [ 1072.245065][T15975] debugfs: Directory 'hsr0' with parent '/' already present! [ 1072.266622][T15975] bridge0: port 2(bridge_slave_1) entered blocking state [ 1072.273694][T15975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1072.281173][T15975] bridge0: port 1(bridge_slave_0) entered blocking state [ 1072.288288][T15975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1072.331425][T15975] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1072.344694][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1072.353697][ T7243] bridge0: port 1(bridge_slave_0) entered disabled state [ 1072.363179][ T7243] bridge0: port 2(bridge_slave_1) entered disabled state [ 1072.380751][T15975] 8021q: adding VLAN 0 to HW filter on device team0 [ 1072.393601][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1072.403009][ T7243] bridge0: port 1(bridge_slave_0) entered blocking state [ 1072.410095][ T7243] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1072.426367][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1072.435290][ T2222] bridge0: port 2(bridge_slave_1) entered blocking state [ 1072.442357][ T2222] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1072.467632][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1072.477031][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1072.486209][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1072.494498][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1072.504084][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1072.514593][T15975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1072.534710][T15975] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1072.926231][T15985] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1072.945152][T15985] CPU: 1 PID: 15985 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1072.953087][T15985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1072.963337][T15985] Call Trace: [ 1072.966659][T15985] dump_stack+0xf5/0x159 [ 1072.970931][T15985] dump_header+0xaa/0x449 [ 1072.975354][T15985] oom_kill_process.cold+0x10/0x15 [ 1072.980494][T15985] out_of_memory+0x231/0xa00 [ 1072.985164][T15985] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1072.990852][T15985] ? timer_reduce+0xa4/0x830 [ 1072.995458][T15985] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1073.001125][T15985] mem_cgroup_out_of_memory+0x128/0x150 [ 1073.006703][T15985] memory_max_write+0x17b/0x250 [ 1073.011612][T15985] cgroup_file_write+0x119/0x320 [ 1073.016571][T15985] ? high_work_func+0x30/0x30 [ 1073.021303][T15985] kernfs_fop_write+0x1f4/0x2e0 [ 1073.026236][T15985] ? cgroup_css.part.0+0x90/0x90 [ 1073.031208][T15985] __vfs_write+0x67/0xc0 [ 1073.035473][T15985] ? kernfs_seq_show+0xe0/0xe0 [ 1073.040289][T15985] vfs_write+0x18a/0x390 [ 1073.044552][T15985] ksys_write+0xd5/0x1b0 [ 1073.048835][T15985] __x64_sys_write+0x4c/0x60 [ 1073.053446][T15985] do_syscall_64+0xcc/0x370 [ 1073.057971][T15985] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1073.063953][T15985] RIP: 0033:0x459f39 [ 1073.067972][T15985] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1073.087649][T15985] RSP: 002b:00007fd04891ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1073.096093][T15985] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1073.104075][T15985] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000b [ 1073.112079][T15985] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1073.120092][T15985] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd04891b6d4 [ 1073.128073][T15985] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1073.138561][T15985] memory: usage 4648kB, limit 0kB, failcnt 684 [ 1073.144843][T15985] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1073.158141][T15985] Memory cgroup stats for /syz3: [ 1073.158414][T15985] anon 4440064 [ 1073.158414][T15985] file 45056 [ 1073.158414][T15985] kernel_stack 36864 [ 1073.158414][T15985] slab 282624 [ 1073.158414][T15985] sock 0 [ 1073.158414][T15985] shmem 0 [ 1073.158414][T15985] file_mapped 0 [ 1073.158414][T15985] file_dirty 135168 [ 1073.158414][T15985] file_writeback 0 [ 1073.158414][T15985] anon_thp 4194304 [ 1073.158414][T15985] inactive_anon 0 [ 1073.158414][T15985] active_anon 4440064 [ 1073.158414][T15985] inactive_file 135168 [ 1073.158414][T15985] active_file 135168 [ 1073.158414][T15985] unevictable 135168 [ 1073.158414][T15985] slab_reclaimable 135168 [ 1073.158414][T15985] slab_unreclaimable 147456 [ 1073.158414][T15985] pgfault 52833 [ 1073.158414][T15985] pgmajfault 0 [ 1073.158414][T15985] workingset_refault 0 [ 1073.158414][T15985] workingset_activate 0 [ 1073.158414][T15985] workingset_nodereclaim 0 [ 1073.158414][T15985] pgrefill 198 [ 1073.158414][T15985] pgscan 198 [ 1073.158414][T15985] pgsteal 0 [ 1073.158414][T15985] pgactivate 198 [ 1073.256116][T15985] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=15981,uid=0 [ 1073.271835][T15985] Memory cgroup out of memory: Killed process 15981 (syz-executor.3) total-vm:72852kB, anon-rss:4244kB, file-rss:35824kB, shmem-rss:0kB, UID:0 pgtables:147456kB oom_score_adj:1000 [ 1073.294259][ T1063] oom_reaper: reaped process 15981 (syz-executor.3), now anon-rss:0kB, file-rss:34864kB, shmem-rss:0kB 16:38:49 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:38:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000019c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2c0000006400010700"/20, @ANYRES32=r2, @ANYBLOB="00000000000000000000000008000b00c9a00080"], 0x2c}}, 0x0) 16:38:49 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xa, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @rand_addr="fe800000000000007029e5e36fc3e001"}, r1}}, 0x48) 16:38:49 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001a00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x651, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2b8e08cd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xff2, 0x0, 0x8a4, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5c5b, 0x0, 0x7fffffff, 0xc739, 0x0, 0xd95, 0x9, 0x0, 0x0, 0x7fff, 0x0, 0x2, 0x0, 0xf43, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3ff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x73, 0x0, 0x1f], [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1bb40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x374, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [0x0, 0x0, 0x1e342bc1, 0x400, 0x8000, 0x7, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6cba, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xbb2, 0x0, 0x0, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0xab1a, 0x5]}, 0x45c) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r0, &(0x7f0000000040), 0x0) 16:38:49 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:38:49 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) [ 1073.903641][T15975] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1073.949482][T15975] CPU: 1 PID: 15975 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1073.957424][T15975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1073.967580][T15975] Call Trace: [ 1073.970931][T15975] dump_stack+0xf5/0x159 [ 1073.975311][T15975] dump_header+0xaa/0x449 [ 1073.979673][T15975] oom_kill_process.cold+0x10/0x15 [ 1073.984850][T15975] out_of_memory+0x231/0xa00 [ 1073.989472][T15975] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1073.995146][T15975] mem_cgroup_out_of_memory+0x128/0x150 [ 1074.000758][T15975] try_charge+0xb3a/0xbc0 [ 1074.005194][T15975] ? rcu_note_context_switch+0x700/0x760 [ 1074.010946][T15975] mem_cgroup_try_charge+0xd2/0x260 [ 1074.016247][T15975] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1074.021991][T15975] wp_page_copy+0x322/0x1160 [ 1074.026606][T15975] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1074.032349][T15975] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1074.038018][T15975] do_wp_page+0x192/0x11f0 [ 1074.042454][T15975] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1074.048171][T15975] __handle_mm_fault+0x1c07/0x2cb0 [ 1074.053406][T15975] handle_mm_fault+0x21b/0x530 [ 1074.058228][T15975] __do_page_fault+0x3fb/0x9e0 [ 1074.063028][T15975] do_page_fault+0x54/0x233 [ 1074.067597][T15975] ? prepare_exit_to_usermode+0x154/0x1a0 [ 1074.073344][T15975] page_fault+0x34/0x40 [ 1074.077514][T15975] RIP: 0033:0x431016 [ 1074.081442][T15975] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 cc 5c 64 00 85 c0 0f 84 [ 1074.101186][T15975] RSP: 002b:00007ffed1e8c1e0 EFLAGS: 00010206 [ 1074.107282][T15975] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1074.115295][T15975] RDX: 0000000001029930 RSI: 0000000001031970 RDI: 0000000000000003 [ 1074.123356][T15975] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000001028940 [ 1074.131342][T15975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1074.139606][T15975] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 16:38:50 executing program 2: r0 = socket(0x10, 0x3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:38:50 executing program 4: recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0xbcd8781b067b5e83) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="51c8"], 0x2) write$cgroup_pid(r1, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) [ 1074.205489][T15975] memory: usage 236kB, limit 0kB, failcnt 701 [ 1074.212841][T15975] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1074.260234][T15975] Memory cgroup stats for /syz3: [ 1074.260503][T15975] anon 110592 [ 1074.260503][T15975] file 45056 [ 1074.260503][T15975] kernel_stack 36864 [ 1074.260503][T15975] slab 282624 [ 1074.260503][T15975] sock 0 [ 1074.260503][T15975] shmem 0 [ 1074.260503][T15975] file_mapped 0 [ 1074.260503][T15975] file_dirty 135168 [ 1074.260503][T15975] file_writeback 0 [ 1074.260503][T15975] anon_thp 0 [ 1074.260503][T15975] inactive_anon 0 [ 1074.260503][T15975] active_anon 110592 [ 1074.260503][T15975] inactive_file 135168 [ 1074.260503][T15975] active_file 135168 [ 1074.260503][T15975] unevictable 135168 [ 1074.260503][T15975] slab_reclaimable 135168 [ 1074.260503][T15975] slab_unreclaimable 147456 [ 1074.260503][T15975] pgfault 52833 [ 1074.260503][T15975] pgmajfault 0 [ 1074.260503][T15975] workingset_refault 0 [ 1074.260503][T15975] workingset_activate 0 [ 1074.260503][T15975] workingset_nodereclaim 0 [ 1074.260503][T15975] pgrefill 198 [ 1074.260503][T15975] pgscan 198 [ 1074.260503][T15975] pgsteal 0 [ 1074.260503][T15975] pgactivate 198 16:38:50 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001a00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x651, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2b8e08cd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xff2, 0x0, 0x8a4, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5c5b, 0x0, 0x7fffffff, 0xc739, 0x0, 0xd95, 0x9, 0x0, 0x0, 0x7fff, 0x0, 0x2, 0x0, 0xf43, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3ff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x73, 0x0, 0x1f], [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1bb40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x374, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [0x0, 0x0, 0x1e342bc1, 0x400, 0x8000, 0x7, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6cba, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xbb2, 0x0, 0x0, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0xab1a, 0x5]}, 0x45c) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r0, &(0x7f0000000040), 0x0) 16:38:50 executing program 5: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x2) [ 1074.381584][T15975] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=15975,uid=0 [ 1074.401871][T15975] Memory cgroup out of memory: Killed process 15975 (syz-executor.3) total-vm:72456kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 [ 1074.555831][ T1063] oom_reaper: reaped process 15975 (syz-executor.3), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 16:38:50 executing program 2: r0 = socket(0x10, 0x3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:38:50 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001a00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x651, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2b8e08cd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xff2, 0x0, 0x8a4, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5c5b, 0x0, 0x7fffffff, 0xc739, 0x0, 0xd95, 0x9, 0x0, 0x0, 0x7fff, 0x0, 0x2, 0x0, 0xf43, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3ff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x73, 0x0, 0x1f], [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1bb40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x374, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [0x0, 0x0, 0x1e342bc1, 0x400, 0x8000, 0x7, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6cba, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xbb2, 0x0, 0x0, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x9, 0x0, 0x0, 0xab1a, 0x5]}, 0x45c) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r0, &(0x7f0000000040), 0x0) [ 1075.155189][T14660] device bridge_slave_1 left promiscuous mode [ 1075.162683][T14660] bridge0: port 2(bridge_slave_1) entered disabled state [ 1075.230096][T14660] device bridge_slave_0 left promiscuous mode [ 1075.237662][T14660] bridge0: port 1(bridge_slave_0) entered disabled state [ 1076.195141][T14660] device hsr_slave_0 left promiscuous mode [ 1076.245091][T14660] device hsr_slave_1 left promiscuous mode [ 1076.294626][T14660] team0 (unregistering): Port device team_slave_1 removed [ 1076.306002][T14660] team0 (unregistering): Port device team_slave_0 removed [ 1076.316902][T14660] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1076.369639][T14660] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1076.432243][T14660] bond0 (unregistering): Released all slaves 16:38:52 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:38:52 executing program 5: openat$ashmem(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ashmem\x00', 0x4000, 0x0) 16:38:52 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="dc000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0xe, &(0x7f0000000140)={r1, @in={{0x2, 0x0, @empty}}}, &(0x7f00000000c0)=0x100) 16:38:52 executing program 0: 16:38:52 executing program 2: r0 = socket(0x10, 0x3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000280008001c000100000000000000000000000000000000000010000002000000080002000000020008000100726564001c01020004010200b205a34f0459cc6abb699f4e08e3b1b5f75780560a59a8480dae55818041c02d8471389f5a076eaa787f8246aef232f41fb4fd095e664069035a011afb427b4799dc17338322cbd91968a88f2fbcbba734486e4d3c392ec5c40433021f006b4ddf02645062bacedcbcd61e4be8eea0e577dae0a23161a078fbdf38770e055341db2eca0ca565e8c92336422a57f6adad6ed581b27ccc9155e93c542353f1681423161cb1e44cc5b75a30515c051d3a8f0d2bcb9e9ebfa6290dd5fd8cd5150410922c3f86a3cee1d9e807ad3428f51c99eb16018bf7a6cd83dca6ff4af8a94fab0a1d86fded7a3835a987bd9f53499def9115ff45ce9d94aa0000000000000000140001000700000000000000000000000000000090755b1181d8ac64ad6e566b7b257541d4d4724304aa7f09742cb7aa1356d8a6ad0ffb6f29159b620809292345aed62b298e22129645d2c2df3a1049bb8561dc4bcf376aa1e40955892f428fef7bf7a683ebf60e73b5375d99d503b76a2eafe39c6e07a7ff905b71f6e41a8be26c62eb3d2530d15a1ab1d9ade93c7871a16f73894c05b9160fb84864e78c5ad2b627edd0d0393f66909ed0110ce53e3466384674a182dc5cf9e641af3ed8ad5f73c2061aef4a4f65c9ae577e81bff9f24354d65f4d1e7a5cf357bf520c903a35d6b21ca60a8728f6c2374d6070950331a750ce506b7fb85105121bba272f13b7e7692a525cf9855f6225739c944d37d257b902533ee7569e5d5df9c4673cdcaafaa26a75d5991552519f4500448ff3c95befb88ae00d"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1076.939527][T16330] IPVS: ftp: loaded support on port[0] = 21 [ 1077.125133][T16330] chnl_net:caif_netlink_parms(): no params data found [ 1077.171453][T16330] bridge0: port 1(bridge_slave_0) entered blocking state [ 1077.183040][T16330] bridge0: port 1(bridge_slave_0) entered disabled state [ 1077.191460][T16330] device bridge_slave_0 entered promiscuous mode [ 1077.204169][T16330] bridge0: port 2(bridge_slave_1) entered blocking state [ 1077.211844][T16330] bridge0: port 2(bridge_slave_1) entered disabled state [ 1077.224649][T16330] device bridge_slave_1 entered promiscuous mode [ 1077.252849][T16330] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1077.268922][T16330] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1077.299957][T16330] team0: Port device team_slave_0 added [ 1077.307291][T16330] team0: Port device team_slave_1 added [ 1077.392561][T16330] device hsr_slave_0 entered promiscuous mode [ 1077.445327][T16330] device hsr_slave_1 entered promiscuous mode [ 1077.495150][T16330] debugfs: Directory 'hsr0' with parent '/' already present! [ 1077.512043][T16330] bridge0: port 2(bridge_slave_1) entered blocking state [ 1077.522443][T16330] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1077.529837][T16330] bridge0: port 1(bridge_slave_0) entered blocking state [ 1077.536906][T16330] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1077.546531][ T3501] bridge0: port 1(bridge_slave_0) entered disabled state [ 1077.558762][ T3501] bridge0: port 2(bridge_slave_1) entered disabled state [ 1077.596184][T16330] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1077.608591][ T7206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1077.616764][ T7206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1077.627127][T16330] 8021q: adding VLAN 0 to HW filter on device team0 [ 1077.642433][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1077.651909][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1077.665539][ T7243] bridge0: port 1(bridge_slave_0) entered blocking state [ 1077.672600][ T7243] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1077.696905][ T7206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1077.706215][ T7206] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1077.714751][ T7206] bridge0: port 2(bridge_slave_1) entered blocking state [ 1077.721891][ T7206] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1077.730634][ T7206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1077.739995][ T7206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1077.749429][ T7206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1077.758398][ T7206] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1077.767884][ T7206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1077.776943][ T7206] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1077.787028][ T7206] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1077.798287][ T7206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1077.807168][ T7206] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1077.819565][T16330] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1077.831614][T16330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1077.840979][ T7206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1077.850080][ T7206] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1077.881545][T16330] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1078.259955][T16342] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1078.291083][T16342] CPU: 0 PID: 16342 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1078.299044][T16342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1078.309138][T16342] Call Trace: [ 1078.312459][T16342] dump_stack+0xf5/0x159 [ 1078.316715][T16342] dump_header+0xaa/0x449 [ 1078.321124][T16342] oom_kill_process.cold+0x10/0x15 [ 1078.326251][T16342] out_of_memory+0x231/0xa00 [ 1078.330842][T16342] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1078.336529][T16342] mem_cgroup_out_of_memory+0x128/0x150 [ 1078.342073][T16342] memory_max_write+0x17b/0x250 [ 1078.347018][T16342] cgroup_file_write+0x119/0x320 [ 1078.352011][T16342] ? high_work_func+0x30/0x30 [ 1078.356820][T16342] kernfs_fop_write+0x1f4/0x2e0 [ 1078.361752][T16342] ? cgroup_css.part.0+0x90/0x90 [ 1078.366691][T16342] __vfs_write+0x67/0xc0 [ 1078.370931][T16342] ? kernfs_seq_show+0xe0/0xe0 [ 1078.375816][T16342] vfs_write+0x18a/0x390 [ 1078.380081][T16342] ksys_write+0xd5/0x1b0 [ 1078.384321][T16342] __x64_sys_write+0x4c/0x60 [ 1078.388997][T16342] do_syscall_64+0xcc/0x370 [ 1078.393499][T16342] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1078.399391][T16342] RIP: 0033:0x459f39 [ 1078.403370][T16342] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1078.422968][T16342] RSP: 002b:00007fa8ef556c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1078.431380][T16342] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1078.439367][T16342] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 1078.447535][T16342] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1078.455494][T16342] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa8ef5576d4 [ 1078.463466][T16342] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1078.473406][T16342] memory: usage 4652kB, limit 0kB, failcnt 781 [ 1078.479659][T16342] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1078.486626][T16342] Memory cgroup stats for /syz1: [ 1078.486838][T16342] anon 4358144 [ 1078.486838][T16342] file 65536 [ 1078.486838][T16342] kernel_stack 73728 [ 1078.486838][T16342] slab 200704 [ 1078.486838][T16342] sock 0 [ 1078.486838][T16342] shmem 0 [ 1078.486838][T16342] file_mapped 0 [ 1078.486838][T16342] file_dirty 0 [ 1078.486838][T16342] file_writeback 0 [ 1078.486838][T16342] anon_thp 4194304 [ 1078.486838][T16342] inactive_anon 135168 [ 1078.486838][T16342] active_anon 4358144 [ 1078.486838][T16342] inactive_file 0 [ 1078.486838][T16342] active_file 0 [ 1078.486838][T16342] unevictable 135168 [ 1078.486838][T16342] slab_reclaimable 135168 [ 1078.486838][T16342] slab_unreclaimable 65536 [ 1078.486838][T16342] pgfault 56859 [ 1078.486838][T16342] pgmajfault 0 [ 1078.486838][T16342] workingset_refault 0 [ 1078.486838][T16342] workingset_activate 0 [ 1078.486838][T16342] workingset_nodereclaim 0 [ 1078.486838][T16342] pgrefill 269 [ 1078.486838][T16342] pgscan 267 [ 1078.486838][T16342] pgsteal 33 [ 1078.486838][T16342] pgactivate 231 [ 1078.582888][T16342] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=16338,uid=0 [ 1078.602021][T16342] Memory cgroup out of memory: Killed process 16338 (syz-executor.1) total-vm:72852kB, anon-rss:4248kB, file-rss:35824kB, shmem-rss:0kB, UID:0 pgtables:151552kB oom_score_adj:1000 [ 1078.626374][ T1063] oom_reaper: reaped process 16338 (syz-executor.1), now anon-rss:0kB, file-rss:34864kB, shmem-rss:0kB 16:38:55 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:38:55 executing program 0: 16:38:55 executing program 5: 16:38:55 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) [ 1079.156085][T16330] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1079.170729][T16330] CPU: 0 PID: 16330 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1079.178659][T16330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1079.188721][T16330] Call Trace: [ 1079.192063][T16330] dump_stack+0xf5/0x159 [ 1079.196333][T16330] dump_header+0xaa/0x449 [ 1079.200693][T16330] oom_kill_process.cold+0x10/0x15 [ 1079.205870][T16330] out_of_memory+0x231/0xa00 [ 1079.210482][T16330] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1079.216180][T16330] mem_cgroup_out_of_memory+0x128/0x150 [ 1079.221825][T16330] try_charge+0xb3a/0xbc0 [ 1079.226227][T16330] ? rcu_note_context_switch+0x700/0x760 [ 1079.233460][T16330] mem_cgroup_try_charge+0xd2/0x260 [ 1079.238758][T16330] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1079.244457][T16330] __handle_mm_fault+0x179a/0x2cb0 [ 1079.249654][T16330] handle_mm_fault+0x21b/0x530 [ 1079.254619][T16330] __do_page_fault+0x3fb/0x9e0 [ 1079.259420][T16330] do_page_fault+0x54/0x233 [ 1079.263948][T16330] ? do_syscall_64+0x270/0x370 [ 1079.268736][T16330] page_fault+0x34/0x40 [ 1079.272903][T16330] RIP: 0033:0x403a42 [ 1079.276827][T16330] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 19 8f 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 39 44 05 00 48 [ 1079.296588][T16330] RSP: 002b:00007ffd74513eb0 EFLAGS: 00010246 16:38:55 executing program 4: 16:38:55 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:38:55 executing program 0: [ 1079.302759][T16330] RAX: 0000000000000000 RBX: 00000000001073d5 RCX: 00000000004139f0 [ 1079.310818][T16330] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffd74514fe0 [ 1079.319071][T16330] RBP: 0000000000000002 R08: 0000000000000001 R09: 000000000259a940 [ 1079.327063][T16330] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffd74514fe0 [ 1079.335048][T16330] R13: 00007ffd74514fd0 R14: 0000000000000000 R15: 00007ffd74514fe0 16:38:55 executing program 5: 16:38:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f00000002c0)={[{0x0, 0x0, 0x0, 0xf1}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:38:55 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1079.547789][T16330] memory: usage 236kB, limit 0kB, failcnt 798 [ 1079.559389][T16330] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 16:38:55 executing program 0: ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f00000002c0)=""/210, 0xd2}, {&(0x7f00000003c0)=""/124, 0x7c}, {&(0x7f0000000440)=""/206, 0xce}, {0x0}], 0x4, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) io_setup(0x0, &(0x7f0000000240)) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x100000001, 0x2c0000) fchdir(0xffffffffffffffff) io_submit(0x0, 0x0, &(0x7f0000000540)) lremovexattr(0x0, 0x0) sched_getattr(0x0, &(0x7f00000000c0)={0x30}, 0x30, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x20000000001, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x80, 0x0, 0x7fffdffa}]}) [ 1079.715061][T16330] Memory cgroup stats for /syz1: [ 1079.715418][T16330] anon 36864 [ 1079.715418][T16330] file 65536 [ 1079.715418][T16330] kernel_stack 0 [ 1079.715418][T16330] slab 200704 [ 1079.715418][T16330] sock 0 [ 1079.715418][T16330] shmem 0 [ 1079.715418][T16330] file_mapped 0 [ 1079.715418][T16330] file_dirty 0 [ 1079.715418][T16330] file_writeback 0 [ 1079.715418][T16330] anon_thp 0 [ 1079.715418][T16330] inactive_anon 135168 [ 1079.715418][T16330] active_anon 36864 [ 1079.715418][T16330] inactive_file 0 [ 1079.715418][T16330] active_file 0 [ 1079.715418][T16330] unevictable 135168 [ 1079.715418][T16330] slab_reclaimable 135168 [ 1079.715418][T16330] slab_unreclaimable 65536 [ 1079.715418][T16330] pgfault 56892 [ 1079.715418][T16330] pgmajfault 0 [ 1079.715418][T16330] workingset_refault 0 [ 1079.715418][T16330] workingset_activate 0 [ 1079.715418][T16330] workingset_nodereclaim 0 [ 1079.715418][T16330] pgrefill 269 [ 1079.715418][T16330] pgscan 267 [ 1079.715418][T16330] pgsteal 33 [ 1079.715418][T16330] pgactivate 231 [ 1079.916127][T14660] device bridge_slave_1 left promiscuous mode [ 1079.923695][T14660] bridge0: port 2(bridge_slave_1) entered disabled state 16:38:55 executing program 5: vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r0 = semget$private(0x0, 0x20000000102, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) [ 1080.045881][T14660] device bridge_slave_0 left promiscuous mode [ 1080.052273][T14660] bridge0: port 1(bridge_slave_0) entered disabled state [ 1080.140577][T16330] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=16330,uid=0 [ 1080.247415][T16330] Memory cgroup out of memory: Killed process 16330 (syz-executor.1) total-vm:72456kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 [ 1080.307818][ T1063] oom_reaper: reaped process 16330 (syz-executor.1), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 1081.255265][T14660] device hsr_slave_0 left promiscuous mode [ 1081.315131][T14660] device hsr_slave_1 left promiscuous mode [ 1081.363853][T14660] team0 (unregistering): Port device team_slave_1 removed [ 1081.374831][T14660] team0 (unregistering): Port device team_slave_0 removed [ 1081.385987][T14660] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1081.428949][T14660] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1081.532654][T14660] bond0 (unregistering): Released all slaves [ 1081.773093][T16472] IPVS: ftp: loaded support on port[0] = 21 16:38:57 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r10, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r2, 0x0, 0x0) 16:38:57 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:38:57 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0x14) [ 1081.929888][T16472] chnl_net:caif_netlink_parms(): no params data found [ 1082.039986][T16472] bridge0: port 1(bridge_slave_0) entered blocking state [ 1082.053798][T16472] bridge0: port 1(bridge_slave_0) entered disabled state [ 1082.063175][T16472] device bridge_slave_0 entered promiscuous mode [ 1082.071804][T16472] bridge0: port 2(bridge_slave_1) entered blocking state [ 1082.100577][T16472] bridge0: port 2(bridge_slave_1) entered disabled state [ 1082.125563][T16472] device bridge_slave_1 entered promiscuous mode [ 1082.165743][T16472] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1082.177031][T16472] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1082.201335][T16472] team0: Port device team_slave_0 added [ 1082.209245][T16472] team0: Port device team_slave_1 added [ 1082.268054][T16472] device hsr_slave_0 entered promiscuous mode [ 1082.330259][T16472] device hsr_slave_1 entered promiscuous mode [ 1082.384959][T16472] debugfs: Directory 'hsr0' with parent '/' already present! [ 1082.406854][T16472] bridge0: port 2(bridge_slave_1) entered blocking state [ 1082.413934][T16472] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1082.421339][T16472] bridge0: port 1(bridge_slave_0) entered blocking state [ 1082.429022][T16472] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1082.480607][T16472] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1082.499996][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1082.512968][ T4362] bridge0: port 1(bridge_slave_0) entered disabled state [ 1082.521824][ T4362] bridge0: port 2(bridge_slave_1) entered disabled state [ 1082.543825][T16472] 8021q: adding VLAN 0 to HW filter on device team0 [ 1082.561095][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1082.574244][ T4362] bridge0: port 1(bridge_slave_0) entered blocking state [ 1082.581343][ T4362] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1082.607170][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1082.616002][ T4358] bridge0: port 2(bridge_slave_1) entered blocking state [ 1082.623044][ T4358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1082.633450][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1082.646432][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1082.660437][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1082.669715][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1082.679030][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1082.689093][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1082.701424][T16472] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1082.713512][T16472] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1082.721841][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1082.732306][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1082.752408][T16472] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1083.124248][T16488] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1083.134887][T16488] CPU: 0 PID: 16488 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1083.143498][T16488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1083.153583][T16488] Call Trace: [ 1083.156960][T16488] dump_stack+0xf5/0x159 [ 1083.161324][T16488] dump_header+0xaa/0x449 [ 1083.165699][T16488] oom_kill_process.cold+0x10/0x15 [ 1083.170825][T16488] out_of_memory+0x231/0xa00 [ 1083.175433][T16488] ? preempt_schedule_common+0x37/0x90 [ 1083.180903][T16488] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1083.186797][T16488] mem_cgroup_out_of_memory+0x128/0x150 [ 1083.192405][T16488] memory_max_write+0x17b/0x250 [ 1083.197285][T16488] cgroup_file_write+0x119/0x320 [ 1083.202220][T16488] ? high_work_func+0x30/0x30 [ 1083.206953][T16488] kernfs_fop_write+0x1f4/0x2e0 [ 1083.211842][T16488] ? cgroup_css.part.0+0x90/0x90 [ 1083.216872][T16488] __vfs_write+0x67/0xc0 [ 1083.221114][T16488] ? kernfs_seq_show+0xe0/0xe0 [ 1083.225868][T16488] vfs_write+0x18a/0x390 [ 1083.230108][T16488] ksys_write+0xd5/0x1b0 [ 1083.236019][T16488] __x64_sys_write+0x4c/0x60 [ 1083.240671][T16488] do_syscall_64+0xcc/0x370 [ 1083.245245][T16488] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1083.251139][T16488] RIP: 0033:0x459f39 [ 1083.255060][T16488] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1083.274943][T16488] RSP: 002b:00007f1c023cbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1083.283361][T16488] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1083.291466][T16488] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 1083.299441][T16488] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1083.307415][T16488] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c023cc6d4 [ 1083.315389][T16488] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1083.329103][T16488] memory: usage 4672kB, limit 0kB, failcnt 710 [ 1083.335392][T16488] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1083.342227][T16488] Memory cgroup stats for /syz3: [ 1083.342449][T16488] anon 4325376 [ 1083.342449][T16488] file 45056 [ 1083.342449][T16488] kernel_stack 73728 [ 1083.342449][T16488] slab 282624 [ 1083.342449][T16488] sock 0 [ 1083.342449][T16488] shmem 0 [ 1083.342449][T16488] file_mapped 0 [ 1083.342449][T16488] file_dirty 135168 [ 1083.342449][T16488] file_writeback 0 [ 1083.342449][T16488] anon_thp 4194304 [ 1083.342449][T16488] inactive_anon 0 [ 1083.342449][T16488] active_anon 4300800 [ 1083.342449][T16488] inactive_file 135168 [ 1083.342449][T16488] active_file 135168 [ 1083.342449][T16488] unevictable 135168 [ 1083.342449][T16488] slab_reclaimable 135168 [ 1083.342449][T16488] slab_unreclaimable 147456 [ 1083.342449][T16488] pgfault 52899 [ 1083.342449][T16488] pgmajfault 0 [ 1083.342449][T16488] workingset_refault 0 [ 1083.342449][T16488] workingset_activate 0 [ 1083.342449][T16488] workingset_nodereclaim 0 [ 1083.342449][T16488] pgrefill 198 [ 1083.342449][T16488] pgscan 198 [ 1083.342449][T16488] pgsteal 0 [ 1083.342449][T16488] pgactivate 198 [ 1083.439619][T16488] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=16484,uid=0 [ 1083.456392][T16488] Memory cgroup out of memory: Killed process 16484 (syz-executor.3) total-vm:72852kB, anon-rss:4196kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:155648kB oom_score_adj:1000 [ 1083.481155][ T1063] oom_reaper: reaped process 16484 (syz-executor.3), now anon-rss:0kB, file-rss:34864kB, shmem-rss:0kB 16:39:00 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:39:00 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r10, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r2, 0x0, 0x0) 16:39:00 executing program 0: ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f00000002c0)=""/210, 0xd2}, {&(0x7f00000003c0)=""/124, 0x7c}, {&(0x7f0000000440)=""/206, 0xce}, {0x0}], 0x4, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) io_setup(0x0, &(0x7f0000000240)) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x100000001, 0x2c0000) fchdir(0xffffffffffffffff) io_submit(0x0, 0x0, &(0x7f0000000540)) lremovexattr(0x0, 0x0) sched_getattr(0x0, &(0x7f00000000c0)={0x30}, 0x30, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x20000000001, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x80, 0x0, 0x7fffdffa}]}) 16:39:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)}, 0x0) 16:39:00 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0x14) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) readv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/4, 0x4}], 0x1) 16:39:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000280008001c000100000000000000000000000000000000000010000002000000080002000000020008000100726564001c01020004010200b205a34f0459cc6abb699f4e08e3b1b5f75780560a59a8480dae55818041c02d8471389f5a076eaa787f8246aef232f41fb4fd095e664069035a011afb427b4799dc17338322cbd91968a88f2fbcbba734486e4d3c392ec5c40433021f006b4ddf02645062bacedcbcd61e4be8eea0e577dae0a23161a078fbdf38770e055341db2eca0ca565e8c92336422a57f6adad6ed581b27ccc9155e93c542353f1681423161cb1e44cc5b75a30515c051d3a8f0d2bcb9e9ebfa6290dd5fd8cd5150410922c3f86a3cee1d9e807ad3428f51c99eb16018bf7a6cd83dca6ff4af8a94fab0a1d86fded7a3835a987bd9f53499def9115ff45ce9d94aa0000000000000000140001000700000000000000000000000000000090755b1181d8ac64ad6e566b7b257541d4d4724304aa7f09742cb7aa1356d8a6ad0ffb6f29159b620809292345aed62b298e22129645d2c2df3a1049bb8561dc4bcf376aa1e40955892f428fef7bf7a683ebf60e73b5375d99d503b76a2eafe39c6e07a7ff905b71f6e41a8be26c62eb3d2530d15a1ab1d9ade93c7871a16f73894c05b9160fb84864e78c5ad2b627edd0d0393f66909ed0110ce53e3466384674a182dc5cf9e641af3ed8ad5f73c2061aef4a4f65c9ae577e81bff9f24354d65f4d1e7a5cf357bf520c903a35d6b21ca60a8728f6c2374d6070950331a750ce506b7fb85105121bba272f13b7e7692a525cf9855f6225739c944d37d257b902533ee7569e5d5df9c4673cdcaafaa26a75d5991552519f4500448ff3c95befb88ae00d"], 0x170}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x4924b68, 0x0) [ 1084.160578][T16472] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1084.203333][T16472] CPU: 0 PID: 16472 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1084.211747][T16472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1084.221962][T16472] Call Trace: [ 1084.225287][T16472] dump_stack+0xf5/0x159 [ 1084.230004][T16472] dump_header+0xaa/0x449 [ 1084.234370][T16472] oom_kill_process.cold+0x10/0x15 [ 1084.239502][T16472] out_of_memory+0x231/0xa00 [ 1084.244118][T16472] ? __kcsan_setup_watchpoint+0x6b/0x4a0 16:39:00 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1084.249829][T16472] mem_cgroup_out_of_memory+0x128/0x150 [ 1084.255452][T16472] try_charge+0xb3a/0xbc0 [ 1084.260348][T16472] ? rcu_note_context_switch+0x700/0x760 [ 1084.266025][T16472] mem_cgroup_try_charge+0xd2/0x260 [ 1084.271273][T16472] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1084.276953][T16472] wp_page_copy+0x322/0x1160 [ 1084.281579][T16472] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1084.287313][T16472] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1084.293655][T16472] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1084.299541][T16472] do_wp_page+0x192/0x11f0 [ 1084.304503][T16472] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1084.310736][T16472] __handle_mm_fault+0x1c07/0x2cb0 [ 1084.315891][T16472] handle_mm_fault+0x21b/0x530 [ 1084.320721][T16472] __do_page_fault+0x3fb/0x9e0 [ 1084.325596][T16472] do_page_fault+0x54/0x233 [ 1084.330135][T16472] ? do_syscall_64+0x270/0x370 [ 1084.334928][T16472] page_fault+0x34/0x40 [ 1084.339116][T16472] RIP: 0033:0x403a42 [ 1084.343043][T16472] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 19 8f 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 39 44 05 00 48 [ 1084.363043][T16472] RSP: 002b:00007ffdda813db0 EFLAGS: 00010246 [ 1084.369123][T16472] RAX: 0000000000000000 RBX: 00000000001086d6 RCX: 00000000004139f0 [ 1084.377185][T16472] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffdda814ee0 [ 1084.385256][T16472] RBP: 0000000000000002 R08: 0000000000000001 R09: 000000000213f940 [ 1084.393247][T16472] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdda814ee0 [ 1084.401300][T16472] R13: 00007ffdda814ed0 R14: 0000000000000000 R15: 00007ffdda814ee0 [ 1084.585026][T16472] memory: usage 256kB, limit 0kB, failcnt 723 [ 1084.592359][T16472] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1084.600368][T16564] debugfs: Directory '16564-4' with parent 'kvm' already present! [ 1084.665019][T16472] Memory cgroup stats for /syz3: [ 1084.665259][T16472] anon 49152 [ 1084.665259][T16472] file 45056 [ 1084.665259][T16472] kernel_stack 36864 [ 1084.665259][T16472] slab 282624 [ 1084.665259][T16472] sock 0 [ 1084.665259][T16472] shmem 0 [ 1084.665259][T16472] file_mapped 0 [ 1084.665259][T16472] file_dirty 135168 [ 1084.665259][T16472] file_writeback 0 [ 1084.665259][T16472] anon_thp 0 [ 1084.665259][T16472] inactive_anon 0 [ 1084.665259][T16472] active_anon 24576 [ 1084.665259][T16472] inactive_file 135168 16:39:00 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 16:39:00 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000140)) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000080)={0x1000, 0x9, 0x0, 0x5c, 0x6}) bind$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x541}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x0, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0xff, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x93}, 0x31a00, 0x9, 0x351, 0x0, 0x7, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x204}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="020029bd7000fddbdf250900000040000100080006006c63000008000100020000000800050004000000080006006e71000008000b0073697000080004004e2000000c0007000a0000000000000008000500090000000800040001000000080004000900000008000500acb600000800040001040000"], 0x7c}, 0x1, 0x0, 0x0, 0x92}, 0x80) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={0x0}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000080)) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @dev}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x20000800, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0xc008ae09, &(0x7f00000013c0)=""/171) r5 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x800) setsockopt$inet_group_source_req(r5, 0x0, 0x0, &(0x7f0000001280)={0x0, {{0x2, 0x4e20, @multicast1}}, {{0x2, 0x4e21, @empty}}}, 0x104) setsockopt$inet_opts(r4, 0x0, 0xd, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='veth0_to_bond\x00', 0x113) [ 1084.665259][T16472] active_file 135168 [ 1084.665259][T16472] unevictable 135168 [ 1084.665259][T16472] slab_reclaimable 135168 [ 1084.665259][T16472] slab_unreclaimable 147456 [ 1084.665259][T16472] pgfault 52899 [ 1084.665259][T16472] pgmajfault 0 [ 1084.665259][T16472] workingset_refault 0 [ 1084.665259][T16472] workingset_activate 0 [ 1084.665259][T16472] workingset_nodereclaim 0 [ 1084.665259][T16472] pgrefill 198 [ 1084.665259][T16472] pgscan 198 [ 1084.665259][T16472] pgsteal 0 [ 1084.665259][T16472] pgactivate 198 16:39:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) syz_open_procfs(0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'veth0_to_bridge\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB]}) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) 16:39:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x4924b68, 0x0) 16:39:01 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x100000d, 0x4000000032, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x24a, 0x0) [ 1085.265760][T14660] device bridge_slave_1 left promiscuous mode [ 1085.272096][T14660] bridge0: port 2(bridge_slave_1) entered disabled state [ 1085.311139][T16472] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=16472,uid=0 [ 1085.375847][T14660] device bridge_slave_0 left promiscuous mode [ 1085.382776][T14660] bridge0: port 1(bridge_slave_0) entered disabled state [ 1085.438451][T16472] Memory cgroup out of memory: Killed process 16472 (syz-executor.3) total-vm:72456kB, anon-rss:76kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 [ 1086.635413][T14660] device hsr_slave_0 left promiscuous mode [ 1086.704962][T14660] device hsr_slave_1 left promiscuous mode [ 1086.763572][T14660] team0 (unregistering): Port device team_slave_1 removed [ 1086.774480][T14660] team0 (unregistering): Port device team_slave_0 removed [ 1086.785817][T14660] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1086.818665][T14660] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1086.902344][T14660] bond0 (unregistering): Released all slaves 16:39:03 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r10, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r2, 0x0, 0x0) [ 1087.121010][T16634] IPVS: ftp: loaded support on port[0] = 21 [ 1087.201636][T16634] chnl_net:caif_netlink_parms(): no params data found [ 1087.262318][T16634] bridge0: port 1(bridge_slave_0) entered blocking state [ 1087.273255][T16634] bridge0: port 1(bridge_slave_0) entered disabled state [ 1087.282241][T16634] device bridge_slave_0 entered promiscuous mode [ 1087.293827][T16634] bridge0: port 2(bridge_slave_1) entered blocking state [ 1087.301793][T16634] bridge0: port 2(bridge_slave_1) entered disabled state [ 1087.313804][T16634] device bridge_slave_1 entered promiscuous mode [ 1087.342607][T16634] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1087.358631][T16634] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1087.389637][T16634] team0: Port device team_slave_0 added [ 1087.398427][T16634] team0: Port device team_slave_1 added [ 1087.458052][T16634] device hsr_slave_0 entered promiscuous mode [ 1087.495409][T16634] device hsr_slave_1 entered promiscuous mode [ 1087.534985][T16634] debugfs: Directory 'hsr0' with parent '/' already present! [ 1087.556577][T16634] bridge0: port 2(bridge_slave_1) entered blocking state [ 1087.563773][T16634] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1087.571163][T16634] bridge0: port 1(bridge_slave_0) entered blocking state [ 1087.578251][T16634] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1087.633851][T16634] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1087.653222][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1087.662167][ T3501] bridge0: port 1(bridge_slave_0) entered disabled state [ 1087.676694][ T3501] bridge0: port 2(bridge_slave_1) entered disabled state [ 1087.698339][T16634] 8021q: adding VLAN 0 to HW filter on device team0 [ 1087.715690][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1087.731896][ T3501] bridge0: port 1(bridge_slave_0) entered blocking state [ 1087.739025][ T3501] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1087.773849][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1087.784486][ T4358] bridge0: port 2(bridge_slave_1) entered blocking state [ 1087.791578][ T4358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1087.807902][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1087.821659][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1087.830973][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1087.845346][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1087.858089][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1087.868486][T16634] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1087.890613][T16634] 8021q: adding VLAN 0 to HW filter on device batadv0 16:39:04 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r10, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r2, 0x0, 0x0) 16:39:04 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000140)) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000080)={0x1000, 0x9, 0x0, 0x5c, 0x6}) bind$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x541}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x0, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0xff, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x93}, 0x31a00, 0x9, 0x351, 0x0, 0x7, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x204}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="020029bd7000fddbdf250900000040000100080006006c63000008000100020000000800050004000000080006006e71000008000b0073697000080004004e2000000c0007000a0000000000000008000500090000000800040001000000080004000900000008000500acb600000800040001040000"], 0x7c}, 0x1, 0x0, 0x0, 0x92}, 0x80) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={0x0}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000080)) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @dev}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x20000800, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0xc008ae09, &(0x7f00000013c0)=""/171) r5 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x800) setsockopt$inet_group_source_req(r5, 0x0, 0x0, &(0x7f0000001280)={0x0, {{0x2, 0x4e20, @multicast1}}, {{0x2, 0x4e21, @empty}}}, 0x104) setsockopt$inet_opts(r4, 0x0, 0xd, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='veth0_to_bond\x00', 0x113) 16:39:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x4924b68, 0x0) 16:39:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000140)) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000080)={0x1000, 0x9, 0x0, 0x5c, 0x6}) bind$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x541}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x0, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0xff, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x93}, 0x31a00, 0x9, 0x351, 0x0, 0x7, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x204}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="020029bd7000fddbdf250900000040000100080006006c63000008000100020000000800050004000000080006006e71000008000b0073697000080004004e2000000c0007000a0000000000000008000500090000000800040001000000080004000900000008000500acb600000800040001040000"], 0x7c}, 0x1, 0x0, 0x0, 0x92}, 0x80) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={0x0}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000080)) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @dev}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x20000800, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0xc008ae09, &(0x7f00000013c0)=""/171) r5 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x800) setsockopt$inet_group_source_req(r5, 0x0, 0x0, &(0x7f0000001280)={0x0, {{0x2, 0x4e20, @multicast1}}, {{0x2, 0x4e21, @empty}}}, 0x104) setsockopt$inet_opts(r4, 0x0, 0xd, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='veth0_to_bond\x00', 0x113) 16:39:04 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000140)) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000080)={0x1000, 0x9, 0x0, 0x5c, 0x6}) bind$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x541}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x0, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0xff, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x93}, 0x31a00, 0x9, 0x351, 0x0, 0x7, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x204}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="020029bd7000fddbdf250900000040000100080006006c63000008000100020000000800050004000000080006006e71000008000b0073697000080004004e2000000c0007000a0000000000000008000500090000000800040001000000080004000900000008000500acb600000800040001040000"], 0x7c}, 0x1, 0x0, 0x0, 0x92}, 0x80) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={0x0}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000080)) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @dev}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x20000800, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0xc008ae09, &(0x7f00000013c0)=""/171) r5 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x800) setsockopt$inet_group_source_req(r5, 0x0, 0x0, &(0x7f0000001280)={0x0, {{0x2, 0x4e20, @multicast1}}, {{0x2, 0x4e21, @empty}}}, 0x104) setsockopt$inet_opts(r4, 0x0, 0xd, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='veth0_to_bond\x00', 0x113) 16:39:04 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r10, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r2, 0x0, 0x0) 16:39:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000040)="a8c6fd11d1261286ac") r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468000000e1801fed9e7ff2420048ea908e", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c00010076657468000000e1801fed9e7ff2420048ea908e", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r12, @ANYBLOB="0000000000000000280012000c00010076657468000000e1801fed9e7ff2420048ea908e", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r12}, [@IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_FLAGS={0x8, 0x8, 0x400}]}, 0x28}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_FLAGS={0x8, 0x8, 0x400}]}, 0x28}}, 0x0) 16:39:05 executing program 0: 16:39:05 executing program 5: 16:39:05 executing program 2: r0 = socket(0x0, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1089.366146][T16768] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 16:39:05 executing program 5: 16:39:05 executing program 0: 16:39:05 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:39:05 executing program 5: 16:39:05 executing program 0: 16:39:06 executing program 2: r0 = socket(0x0, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:39:06 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) [ 1090.580674][T16891] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1090.638262][T16891] CPU: 0 PID: 16891 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1090.646242][T16891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1090.656321][T16891] Call Trace: [ 1090.659690][T16891] dump_stack+0xf5/0x159 [ 1090.663971][T16891] dump_header+0xaa/0x449 [ 1090.668376][T16891] oom_kill_process.cold+0x10/0x15 [ 1090.673527][T16891] out_of_memory+0x231/0xa00 [ 1090.678167][T16891] ? preempt_schedule_common+0x37/0x90 [ 1090.683721][T16891] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1090.689432][T16891] mem_cgroup_out_of_memory+0x128/0x150 [ 1090.695016][T16891] memory_max_write+0x17b/0x250 [ 1090.699930][T16891] cgroup_file_write+0x119/0x320 [ 1090.704901][T16891] ? high_work_func+0x30/0x30 [ 1090.709611][T16891] kernfs_fop_write+0x1f4/0x2e0 [ 1090.714484][T16891] ? cgroup_css.part.0+0x90/0x90 [ 1090.719462][T16891] __vfs_write+0x67/0xc0 [ 1090.723787][T16891] ? kernfs_seq_show+0xe0/0xe0 [ 1090.728575][T16891] vfs_write+0x18a/0x390 [ 1090.732844][T16891] ksys_write+0xd5/0x1b0 [ 1090.737234][T16891] __x64_sys_write+0x4c/0x60 [ 1090.741854][T16891] do_syscall_64+0xcc/0x370 [ 1090.746449][T16891] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1090.752346][T16891] RIP: 0033:0x459f39 [ 1090.756271][T16891] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1090.775898][T16891] RSP: 002b:00007f1919c64c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1090.784430][T16891] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1090.792414][T16891] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000b [ 1090.800400][T16891] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1090.808387][T16891] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1919c656d4 [ 1090.816388][T16891] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1090.965750][T16891] memory: usage 4732kB, limit 0kB, failcnt 807 [ 1090.971974][T16891] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1090.978921][T16891] Memory cgroup stats for /syz1: [ 1090.979232][T16891] anon 4321280 [ 1090.979232][T16891] file 65536 [ 1090.979232][T16891] kernel_stack 36864 [ 1090.979232][T16891] slab 335872 [ 1090.979232][T16891] sock 0 [ 1090.979232][T16891] shmem 0 [ 1090.979232][T16891] file_mapped 0 [ 1090.979232][T16891] file_dirty 0 [ 1090.979232][T16891] file_writeback 0 [ 1090.979232][T16891] anon_thp 4194304 [ 1090.979232][T16891] inactive_anon 135168 [ 1090.979232][T16891] active_anon 4321280 [ 1090.979232][T16891] inactive_file 0 [ 1090.979232][T16891] active_file 0 [ 1090.979232][T16891] unevictable 135168 [ 1090.979232][T16891] slab_reclaimable 135168 [ 1090.979232][T16891] slab_unreclaimable 200704 [ 1090.979232][T16891] pgfault 57156 [ 1090.979232][T16891] pgmajfault 0 [ 1090.979232][T16891] workingset_refault 0 [ 1090.979232][T16891] workingset_activate 0 [ 1090.979232][T16891] workingset_nodereclaim 0 [ 1090.979232][T16891] pgrefill 269 [ 1090.979232][T16891] pgscan 267 [ 1090.979232][T16891] pgsteal 33 [ 1090.979232][T16891] pgactivate 231 [ 1091.089065][T16891] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=16885,uid=0 [ 1091.104743][T16891] Memory cgroup out of memory: Killed process 16885 (syz-executor.1) total-vm:72848kB, anon-rss:4256kB, file-rss:35820kB, shmem-rss:0kB, UID:0 pgtables:151552kB oom_score_adj:1000 [ 1091.145976][ T1063] oom_reaper: reaped process 16885 (syz-executor.1), now anon-rss:0kB, file-rss:34872kB, shmem-rss:0kB [ 1091.426506][T14660] device bridge_slave_1 left promiscuous mode [ 1091.432824][T14660] bridge0: port 2(bridge_slave_1) entered disabled state [ 1091.503878][T16634] syz-executor.1 invoked oom-killer: gfp_mask=0x40c50(GFP_NOFS|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 1091.516695][T16634] CPU: 0 PID: 16634 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1091.524583][T16634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1091.534625][T16634] Call Trace: [ 1091.537910][T16634] dump_stack+0xf5/0x159 [ 1091.542303][T16634] dump_header+0xaa/0x449 [ 1091.546709][T16634] oom_kill_process.cold+0x10/0x15 [ 1091.551829][T16634] out_of_memory+0x231/0xa00 [ 1091.556447][T16634] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1091.562083][T16634] mem_cgroup_out_of_memory+0x128/0x150 [ 1091.567627][T16634] try_charge+0xb3a/0xbc0 [ 1091.571999][T16634] ? __tsan_read4+0x2c/0x30 [ 1091.576495][T16634] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 1091.581958][T16634] cache_grow_begin+0x3ed/0x670 [ 1091.587064][T16634] fallback_alloc+0x161/0x1f0 [ 1091.591751][T16634] ____cache_alloc_node+0x1b1/0x1c0 [ 1091.596939][T16634] ? debug_smp_processor_id+0x4c/0x172 [ 1091.602432][T16634] kmem_cache_alloc+0x179/0x5d0 [ 1091.607441][T16634] ? __ext4_check_dir_entry+0x13a/0x220 [ 1091.612972][T16634] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1091.618704][T16634] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1091.624326][T16634] ? ext4_free_in_core_inode+0x50/0x50 [ 1091.629811][T16634] ext4_alloc_inode+0x45/0x390 [ 1091.634690][T16634] alloc_inode+0x48/0x130 [ 1091.639040][T16634] iget_locked+0x19b/0x2e0 [ 1091.643460][T16634] __ext4_iget+0x181/0x20e0 [ 1091.647971][T16634] ? __ext4_find_entry+0x6d8/0x970 [ 1091.653138][T16634] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1091.658759][T16634] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1091.664472][T16634] ext4_lookup+0x25e/0x4f0 [ 1091.668942][T16634] __lookup_slow+0x129/0x2a0 [ 1091.673524][T16634] lookup_slow+0x4f/0x70 [ 1091.677816][T16634] path_mountpoint+0x3d5/0xd70 [ 1091.682573][T16634] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1091.688195][T16634] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1091.693892][T16634] filename_mountpoint+0x134/0x270 [ 1091.698996][T16634] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1091.704621][T16634] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1091.710918][T16634] ? strncpy_from_user+0x219/0x2b0 [ 1091.716021][T16634] user_path_mountpoint_at+0x43/0x60 [ 1091.721399][T16634] ksys_umount+0xdb/0xad0 [ 1091.725794][T16634] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1091.731475][T16634] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1091.737149][T16634] ? __tsan_read8+0x2c/0x30 [ 1091.741652][T16634] __x64_sys_umount+0x3a/0x50 [ 1091.746327][T16634] do_syscall_64+0xcc/0x370 [ 1091.750821][T16634] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1091.756738][T16634] RIP: 0033:0x45c967 [ 1091.760628][T16634] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1091.781490][T16634] RSP: 002b:00007ffeec5c9018 EFLAGS: 00000202 ORIG_RAX: 00000000000000a6 [ 1091.789961][T16634] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c967 [ 1091.797970][T16634] RDX: 0000000000403a70 RSI: 0000000000000002 RDI: 00007ffeec5c90c0 [ 1091.805925][T16634] RBP: 000000000000000a R08: 0000000000000000 R09: 000000000000000e [ 1091.813887][T16634] R10: 000000000000000a R11: 0000000000000202 R12: 00007ffeec5ca150 [ 1091.821899][T16634] R13: 000000000281b940 R14: 0000000000000000 R15: 00007ffeec5ca150 [ 1091.831238][T16634] memory: usage 308kB, limit 0kB, failcnt 832 [ 1091.831507][T14660] device bridge_slave_0 left promiscuous mode [ 1091.842728][T14660] bridge0: port 1(bridge_slave_0) entered disabled state [ 1091.844529][T16634] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1091.858035][T16634] Memory cgroup stats for /syz1: [ 1091.858314][T16634] anon 151552 [ 1091.858314][T16634] file 65536 [ 1091.858314][T16634] kernel_stack 0 [ 1091.858314][T16634] slab 335872 [ 1091.858314][T16634] sock 0 [ 1091.858314][T16634] shmem 0 [ 1091.858314][T16634] file_mapped 0 [ 1091.858314][T16634] file_dirty 0 [ 1091.858314][T16634] file_writeback 0 [ 1091.858314][T16634] anon_thp 0 [ 1091.858314][T16634] inactive_anon 135168 [ 1091.858314][T16634] active_anon 151552 [ 1091.858314][T16634] inactive_file 0 [ 1091.858314][T16634] active_file 0 [ 1091.858314][T16634] unevictable 135168 [ 1091.858314][T16634] slab_reclaimable 135168 [ 1091.858314][T16634] slab_unreclaimable 200704 [ 1091.858314][T16634] pgfault 57156 [ 1091.858314][T16634] pgmajfault 0 [ 1091.858314][T16634] workingset_refault 0 [ 1091.858314][T16634] workingset_activate 0 [ 1091.858314][T16634] workingset_nodereclaim 0 [ 1091.858314][T16634] pgrefill 269 [ 1091.858314][T16634] pgscan 267 [ 1091.858314][T16634] pgsteal 33 [ 1091.858314][T16634] pgactivate 231 [ 1091.953884][T16634] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=16634,uid=0 [ 1091.974630][T16634] Memory cgroup out of memory: Killed process 16634 (syz-executor.1) total-vm:72452kB, anon-rss:100kB, file-rss:35776kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 [ 1092.019058][ T1063] oom_reaper: reaped process 16634 (syz-executor.1), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 1092.795269][T14660] device hsr_slave_0 left promiscuous mode [ 1092.835127][T14660] device hsr_slave_1 left promiscuous mode [ 1092.883720][T14660] team0 (unregistering): Port device team_slave_1 removed [ 1092.895251][T14660] team0 (unregistering): Port device team_slave_0 removed [ 1092.905839][T14660] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1092.949267][T14660] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1093.041337][T14660] bond0 (unregistering): Released all slaves [ 1093.143929][T16904] IPVS: ftp: loaded support on port[0] = 21 [ 1093.289582][T16904] chnl_net:caif_netlink_parms(): no params data found [ 1093.328356][T16904] bridge0: port 1(bridge_slave_0) entered blocking state [ 1093.335597][T16904] bridge0: port 1(bridge_slave_0) entered disabled state [ 1093.343542][T16904] device bridge_slave_0 entered promiscuous mode [ 1093.395096][T16904] bridge0: port 2(bridge_slave_1) entered blocking state [ 1093.402268][T16904] bridge0: port 2(bridge_slave_1) entered disabled state [ 1093.411326][T16904] device bridge_slave_1 entered promiscuous mode [ 1093.439578][T16904] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1093.450744][T16904] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1093.474507][T16904] team0: Port device team_slave_0 added [ 1093.481709][T16904] team0: Port device team_slave_1 added [ 1093.542107][T16904] device hsr_slave_0 entered promiscuous mode [ 1093.605359][T16904] device hsr_slave_1 entered promiscuous mode [ 1093.654998][T16904] debugfs: Directory 'hsr0' with parent '/' already present! [ 1093.677751][T16904] bridge0: port 2(bridge_slave_1) entered blocking state [ 1093.685148][T16904] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1093.692516][T16904] bridge0: port 1(bridge_slave_0) entered blocking state [ 1093.699706][T16904] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1093.754548][T16904] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1093.773668][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1093.782646][ T4358] bridge0: port 1(bridge_slave_0) entered disabled state [ 1093.796998][ T4358] bridge0: port 2(bridge_slave_1) entered disabled state [ 1093.816778][T16904] 8021q: adding VLAN 0 to HW filter on device team0 [ 1093.829776][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1093.838416][ T4358] bridge0: port 1(bridge_slave_0) entered blocking state [ 1093.845488][ T4358] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1093.867246][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1093.876297][ T2222] bridge0: port 2(bridge_slave_1) entered blocking state [ 1093.883331][ T2222] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1093.900573][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1093.925127][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1093.933595][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1093.947939][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1093.960089][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1093.972430][T16904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1094.001017][T16904] 8021q: adding VLAN 0 to HW filter on device batadv0 16:39:10 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r10, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r2, 0x0, 0x0) 16:39:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000040)="a8c6fd11d1261286ac") r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468000000e1801fed9e7ff2420048ea908e", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c00010076657468000000e1801fed9e7ff2420048ea908e", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r12, @ANYBLOB="0000000000000000280012000c00010076657468000000e1801fed9e7ff2420048ea908e", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r12}, [@IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_FLAGS={0x8, 0x8, 0x400}]}, 0x28}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_FLAGS={0x8, 0x8, 0x400}]}, 0x28}}, 0x0) 16:39:10 executing program 2: r0 = socket(0x0, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:39:10 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSERIAL(r0, 0x541f, 0x0) 16:39:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000040), 0x8) 16:39:10 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:39:10 executing program 5: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000001000)=""/4109) 16:39:10 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000001a00)=[{{&(0x7f0000000580)={0x2, 0x4e24, @dev}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3}]}}}], 0x18}}], 0x1, 0x0) 16:39:10 executing program 2: r0 = socket(0x10, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000280008001c000100000000000000000000000000000000000010000002000000080002000000020008000100726564001c01020004010200b205a34f0459cc6abb699f4e08e3b1b5f75780560a59a8480dae55818041c02d8471389f5a076eaa787f8246aef232f41fb4fd095e664069035a011afb427b4799dc17338322cbd91968a88f2fbcbba734486e4d3c392ec5c40433021f006b4ddf02645062bacedcbcd61e4be8eea0e577dae0a23161a078fbdf38770e055341db2eca0ca565e8c92336422a57f6adad6ed581b27ccc9155e93c542353f1681423161cb1e44cc5b75a30515c051d3a8f0d2bcb9e9ebfa6290dd5fd8cd5150410922c3f86a3cee1d9e807ad3428f51c99eb16018bf7a6cd83dca6ff4af8a94fab0a1d86fded7a3835a987bd9f53499def9115ff45ce9d94aa0000000000000000140001000700000000000000000000000000000090755b1181d8ac64ad6e566b7b257541d4d4724304aa7f09742cb7aa1356d8a6ad0ffb6f29159b620809292345aed62b298e22129645d2c2df3a1049bb8561dc4bcf376aa1e40955892f428fef7bf7a683ebf60e73b5375d99d503b76a2eafe39c6e07a7ff905b71f6e41a8be26c62eb3d2530d15a1ab1d9ade93c7871a16f73894c05b9160fb84864e78c5ad2b627edd0d0393f66909ed0110ce53e3466384674a182dc5cf9e641af3ed8ad5f73c2061aef4a4f65c9ae577e81bff9f24354d65f4d1e7a5cf357bf520c903a35d6b21ca60a8728f6c2374d6070950331a750ce506b7fb85105121bba272f13b7e7692a525cf9855f6225739c944d37d257b902533ee7569e5d5df9c4673cdcaafaa26a75d5991552519f4500448ff3c95befb88ae00d"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:39:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000004c0)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) [ 1095.212117][T16921] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 16:39:11 executing program 0: madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) 16:39:11 executing program 2: r0 = socket(0x10, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:39:11 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:39:12 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000280008001c000100000000000000000000000000000000000010000002000000080002000000020008000100726564001c01020004010200b205a34f0459cc6abb699f4e08e3b1b5f75780560a59a8480dae55818041c02d8471389f5a076eaa787f8246aef232f41fb4fd095e664069035a011afb427b4799dc17338322cbd91968a88f2fbcbba734486e4d3c392ec5c40433021f006b4ddf02645062bacedcbcd61e4be8eea0e577dae0a23161a078fbdf38770e055341db2eca0ca565e8c92336422a57f6adad6ed581b27ccc9155e93c542353f1681423161cb1e44cc5b75a30515c051d3a8f0d2bcb9e9ebfa6290dd5fd8cd5150410922c3f86a3cee1d9e807ad3428f51c99eb16018bf7a6cd83dca6ff4af8a94fab0a1d86fded7a3835a987bd9f53499def9115ff45ce9d94aa0000000000000000140001000700000000000000000000000000000090755b1181d8ac64ad6e566b7b257541d4d4724304aa7f09742cb7aa1356d8a6ad0ffb6f29159b620809292345aed62b298e22129645d2c2df3a1049bb8561dc4bcf376aa1e40955892f428fef7bf7a683ebf60e73b5375d99d503b76a2eafe39c6e07a7ff905b71f6e41a8be26c62eb3d2530d15a1ab1d9ade93c7871a16f73894c05b9160fb84864e78c5ad2b627edd0d0393f66909ed0110ce53e3466384674a182dc5cf9e641af3ed8ad5f73c2061aef4a4f65c9ae577e81bff9f24354d65f4d1e7a5cf357bf520c903a35d6b21ca60a8728f6c2374d6070950331a750ce506b7fb85105121bba272f13b7e7692a525cf9855f6225739c944d37d257b902533ee7569e5d5df9c4673cdcaafaa26a75d5991552519f4500448ff3c95befb88ae00d"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:39:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000004c0)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) [ 1096.383439][T17062] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1096.555316][T17062] CPU: 1 PID: 17062 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1096.563262][T17062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1096.573498][T17062] Call Trace: [ 1096.576821][T17062] dump_stack+0xf5/0x159 [ 1096.581099][T17062] dump_header+0xaa/0x449 [ 1096.585487][T17062] oom_kill_process.cold+0x10/0x15 [ 1096.590652][T17062] out_of_memory+0x231/0xa00 [ 1096.595268][T17062] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1096.600942][T17062] mem_cgroup_out_of_memory+0x128/0x150 [ 1096.606532][T17062] memory_max_write+0x17b/0x250 [ 1096.611479][T17062] cgroup_file_write+0x119/0x320 [ 1096.616461][T17062] ? high_work_func+0x30/0x30 [ 1096.621167][T17062] kernfs_fop_write+0x1f4/0x2e0 [ 1096.626047][T17062] ? cgroup_css.part.0+0x90/0x90 [ 1096.631010][T17062] __vfs_write+0x67/0xc0 [ 1096.635308][T17062] ? kernfs_seq_show+0xe0/0xe0 [ 1096.640095][T17062] vfs_write+0x18a/0x390 [ 1096.644374][T17062] ksys_write+0xd5/0x1b0 [ 1096.648642][T17062] __x64_sys_write+0x4c/0x60 [ 1096.653260][T17062] do_syscall_64+0xcc/0x370 [ 1096.657814][T17062] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1096.663712][T17062] RIP: 0033:0x459f39 [ 1096.667634][T17062] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1096.687685][T17062] RSP: 002b:00007f555fa67c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1096.696261][T17062] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1096.704327][T17062] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000b [ 1096.712313][T17062] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1096.720363][T17062] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f555fa686d4 [ 1096.728436][T17062] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1096.824982][T17062] memory: usage 4744kB, limit 0kB, failcnt 732 [ 1096.855092][T17062] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1096.883820][T17062] Memory cgroup stats for /syz3: [ 1096.884108][T17062] anon 4403200 [ 1096.884108][T17062] file 45056 [ 1096.884108][T17062] kernel_stack 0 [ 1096.884108][T17062] slab 282624 [ 1096.884108][T17062] sock 0 [ 1096.884108][T17062] shmem 0 [ 1096.884108][T17062] file_mapped 0 [ 1096.884108][T17062] file_dirty 135168 [ 1096.884108][T17062] file_writeback 0 [ 1096.884108][T17062] anon_thp 4194304 [ 1096.884108][T17062] inactive_anon 0 [ 1096.884108][T17062] active_anon 4317184 [ 1096.884108][T17062] inactive_file 135168 [ 1096.884108][T17062] active_file 135168 [ 1096.884108][T17062] unevictable 135168 [ 1096.884108][T17062] slab_reclaimable 135168 [ 1096.884108][T17062] slab_unreclaimable 147456 [ 1096.884108][T17062] pgfault 53163 [ 1096.884108][T17062] pgmajfault 0 [ 1096.884108][T17062] workingset_refault 0 [ 1096.884108][T17062] workingset_activate 0 [ 1096.884108][T17062] workingset_nodereclaim 0 [ 1096.884108][T17062] pgrefill 198 [ 1096.884108][T17062] pgscan 198 [ 1096.884108][T17062] pgsteal 0 [ 1096.884108][T17062] pgactivate 198 [ 1096.980754][T17062] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=17052,uid=0 [ 1096.996400][T17062] Memory cgroup out of memory: Killed process 17052 (syz-executor.3) total-vm:72848kB, anon-rss:4256kB, file-rss:35820kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 1097.016621][ T1063] oom_reaper: reaped process 17052 (syz-executor.3), now anon-rss:0kB, file-rss:34876kB, shmem-rss:0kB [ 1097.265757][T14660] device bridge_slave_1 left promiscuous mode [ 1097.272047][T14660] bridge0: port 2(bridge_slave_1) entered disabled state [ 1097.315925][T14660] device bridge_slave_0 left promiscuous mode [ 1097.322354][T14660] bridge0: port 1(bridge_slave_0) entered disabled state [ 1097.493124][T16904] syz-executor.3 invoked oom-killer: gfp_mask=0x40c50(GFP_NOFS|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 1097.510679][T16904] CPU: 1 PID: 16904 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1097.518594][T16904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1097.528666][T16904] Call Trace: [ 1097.532003][T16904] dump_stack+0xf5/0x159 [ 1097.536271][T16904] dump_header+0xaa/0x449 [ 1097.540632][T16904] oom_kill_process.cold+0x10/0x15 [ 1097.545790][T16904] out_of_memory+0x231/0xa00 [ 1097.550406][T16904] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1097.556092][T16904] mem_cgroup_out_of_memory+0x128/0x150 [ 1097.561717][T16904] try_charge+0xb3a/0xbc0 [ 1097.566071][T16904] ? __tsan_read4+0x2c/0x30 [ 1097.570649][T16904] __memcg_kmem_charge_memcg+0x4a/0xe0 [ 1097.576182][T16904] cache_grow_begin+0x3ed/0x670 [ 1097.581054][T16904] fallback_alloc+0x161/0x1f0 [ 1097.585835][T16904] ____cache_alloc_node+0x1b1/0x1c0 [ 1097.591131][T16904] ? debug_smp_processor_id+0x4c/0x172 [ 1097.596689][T16904] kmem_cache_alloc+0x179/0x5d0 [ 1097.601550][T16904] ? __ext4_check_dir_entry+0x13a/0x220 [ 1097.607220][T16904] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1097.612839][T16904] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1097.618463][T16904] ? ext4_free_in_core_inode+0x50/0x50 [ 1097.623990][T16904] ext4_alloc_inode+0x45/0x390 [ 1097.628747][T16904] alloc_inode+0x48/0x130 [ 1097.633167][T16904] iget_locked+0x19b/0x2e0 [ 1097.637595][T16904] __ext4_iget+0x181/0x20e0 [ 1097.642151][T16904] ? __ext4_find_entry+0x6d8/0x970 [ 1097.647410][T16904] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1097.653034][T16904] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1097.658731][T16904] ext4_lookup+0x25e/0x4f0 [ 1097.663211][T16904] __lookup_slow+0x129/0x2a0 [ 1097.667851][T16904] lookup_slow+0x4f/0x70 [ 1097.672154][T16904] path_mountpoint+0x3d5/0xd70 [ 1097.677006][T16904] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1097.682634][T16904] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1097.688311][T16904] filename_mountpoint+0x134/0x270 [ 1097.693417][T16904] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1097.699114][T16904] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1097.705403][T16904] ? strncpy_from_user+0x219/0x2b0 [ 1097.710528][T16904] user_path_mountpoint_at+0x43/0x60 [ 1097.715803][T16904] ksys_umount+0xdb/0xad0 [ 1097.720120][T16904] ? __tsan_read8+0x2c/0x30 [ 1097.724632][T16904] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1097.730259][T16904] __x64_sys_umount+0x3a/0x50 [ 1097.734999][T16904] do_syscall_64+0xcc/0x370 [ 1097.739521][T16904] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1097.745404][T16904] RIP: 0033:0x45c967 [ 1097.749311][T16904] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1097.768906][T16904] RSP: 002b:00007ffd9184aab8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a6 [ 1097.777316][T16904] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c967 [ 1097.785283][T16904] RDX: 0000000000403a70 RSI: 0000000000000002 RDI: 00007ffd9184ab60 [ 1097.793248][T16904] RBP: 000000000000000a R08: 0000000000000000 R09: 000000000000000e [ 1097.801202][T16904] R10: 000000000000000a R11: 0000000000000202 R12: 00007ffd9184bbf0 [ 1097.809169][T16904] R13: 0000000001c62940 R14: 0000000000000000 R15: 00007ffd9184bbf0 [ 1097.818071][T16904] memory: usage 328kB, limit 0kB, failcnt 749 [ 1097.824428][T16904] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1097.831409][T16904] Memory cgroup stats for /syz3: [ 1097.831720][T16904] anon 94208 [ 1097.831720][T16904] file 45056 [ 1097.831720][T16904] kernel_stack 0 [ 1097.831720][T16904] slab 282624 [ 1097.831720][T16904] sock 0 [ 1097.831720][T16904] shmem 0 [ 1097.831720][T16904] file_mapped 0 [ 1097.831720][T16904] file_dirty 135168 [ 1097.831720][T16904] file_writeback 0 [ 1097.831720][T16904] anon_thp 0 [ 1097.831720][T16904] inactive_anon 0 [ 1097.831720][T16904] active_anon 8192 [ 1097.831720][T16904] inactive_file 135168 [ 1097.831720][T16904] active_file 135168 [ 1097.831720][T16904] unevictable 135168 [ 1097.831720][T16904] slab_reclaimable 135168 [ 1097.831720][T16904] slab_unreclaimable 147456 [ 1097.831720][T16904] pgfault 53196 [ 1097.831720][T16904] pgmajfault 0 [ 1097.831720][T16904] workingset_refault 0 [ 1097.831720][T16904] workingset_activate 0 [ 1097.831720][T16904] workingset_nodereclaim 0 [ 1097.831720][T16904] pgrefill 198 [ 1097.831720][T16904] pgscan 198 [ 1097.831720][T16904] pgsteal 0 [ 1097.831720][T16904] pgactivate 198 [ 1098.014921][T16904] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=16904,uid=0 [ 1098.039573][T16904] Memory cgroup out of memory: Killed process 16904 (syz-executor.3) total-vm:72452kB, anon-rss:100kB, file-rss:35776kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 [ 1098.063504][ T1063] oom_reaper: reaped process 16904 (syz-executor.3), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 1098.595264][T14660] device hsr_slave_0 left promiscuous mode [ 1098.635067][T14660] device hsr_slave_1 left promiscuous mode [ 1098.683689][T14660] team0 (unregistering): Port device team_slave_1 removed [ 1098.695132][T14660] team0 (unregistering): Port device team_slave_0 removed [ 1098.705883][T14660] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1098.740080][T14660] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1098.801558][T14660] bond0 (unregistering): Released all slaves [ 1098.903887][T17178] IPVS: ftp: loaded support on port[0] = 21 [ 1099.101413][T17178] chnl_net:caif_netlink_parms(): no params data found [ 1099.150578][T17178] bridge0: port 1(bridge_slave_0) entered blocking state [ 1099.157828][T17178] bridge0: port 1(bridge_slave_0) entered disabled state [ 1099.170320][T17178] device bridge_slave_0 entered promiscuous mode [ 1099.178230][T17178] bridge0: port 2(bridge_slave_1) entered blocking state [ 1099.190107][T17178] bridge0: port 2(bridge_slave_1) entered disabled state [ 1099.198698][T17178] device bridge_slave_1 entered promiscuous mode [ 1099.231044][T17178] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1099.242264][T17178] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1099.274423][T17178] team0: Port device team_slave_0 added [ 1099.283229][T17178] team0: Port device team_slave_1 added [ 1099.408211][T17178] device hsr_slave_0 entered promiscuous mode [ 1099.445327][T17178] device hsr_slave_1 entered promiscuous mode [ 1099.505052][T17178] debugfs: Directory 'hsr0' with parent '/' already present! [ 1099.522295][T17178] bridge0: port 2(bridge_slave_1) entered blocking state [ 1099.529436][T17178] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1099.536768][T17178] bridge0: port 1(bridge_slave_0) entered blocking state [ 1099.544065][T17178] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1099.597783][T17178] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1099.616889][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1099.630869][ T4362] bridge0: port 1(bridge_slave_0) entered disabled state [ 1099.639431][ T4362] bridge0: port 2(bridge_slave_1) entered disabled state [ 1099.657428][T17178] 8021q: adding VLAN 0 to HW filter on device team0 [ 1099.669950][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1099.678790][ T2222] bridge0: port 1(bridge_slave_0) entered blocking state [ 1099.685875][ T2222] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1099.706551][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1099.716890][ T2222] bridge0: port 2(bridge_slave_1) entered blocking state [ 1099.724113][ T2222] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1099.733500][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1099.743335][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1099.759567][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1099.768798][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1099.782338][T17178] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1099.794075][T17178] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1099.804418][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1099.833701][T17178] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1100.233570][T17188] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1100.243962][T17188] CPU: 1 PID: 17188 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1100.251867][T17188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1100.261927][T17188] Call Trace: [ 1100.265256][T17188] dump_stack+0xf5/0x159 [ 1100.269591][T17188] dump_header+0xaa/0x449 [ 1100.273947][T17188] oom_kill_process.cold+0x10/0x15 [ 1100.279140][T17188] out_of_memory+0x231/0xa00 [ 1100.283753][T17188] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1100.289421][T17188] mem_cgroup_out_of_memory+0x128/0x150 [ 1100.294990][T17188] memory_max_write+0x17b/0x250 [ 1100.299857][T17188] cgroup_file_write+0x119/0x320 [ 1100.304795][T17188] ? high_work_func+0x30/0x30 [ 1100.309552][T17188] kernfs_fop_write+0x1f4/0x2e0 [ 1100.314401][T17188] ? cgroup_css.part.0+0x90/0x90 [ 1100.319332][T17188] __vfs_write+0x67/0xc0 [ 1100.323589][T17188] ? kernfs_seq_show+0xe0/0xe0 [ 1100.328411][T17188] vfs_write+0x18a/0x390 [ 1100.332649][T17188] ksys_write+0xd5/0x1b0 [ 1100.336945][T17188] __x64_sys_write+0x4c/0x60 [ 1100.341537][T17188] do_syscall_64+0xcc/0x370 [ 1100.346040][T17188] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1100.351931][T17188] RIP: 0033:0x459f39 [ 1100.355822][T17188] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1100.375451][T17188] RSP: 002b:00007f930599bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1100.383973][T17188] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1100.391934][T17188] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000b [ 1100.399892][T17188] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1100.408590][T17188] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f930599c6d4 [ 1100.416552][T17188] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1100.426583][T17188] memory: usage 4680kB, limit 0kB, failcnt 841 [ 1100.432777][T17188] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1100.439944][T17188] Memory cgroup stats for /syz1: [ 1100.440179][T17188] anon 4296704 [ 1100.440179][T17188] file 65536 [ 1100.440179][T17188] kernel_stack 36864 [ 1100.440179][T17188] slab 335872 [ 1100.440179][T17188] sock 0 [ 1100.440179][T17188] shmem 0 [ 1100.440179][T17188] file_mapped 0 [ 1100.440179][T17188] file_dirty 0 [ 1100.440179][T17188] file_writeback 0 [ 1100.440179][T17188] anon_thp 4194304 [ 1100.440179][T17188] inactive_anon 135168 [ 1100.440179][T17188] active_anon 4304896 [ 1100.440179][T17188] inactive_file 0 [ 1100.440179][T17188] active_file 0 [ 1100.440179][T17188] unevictable 135168 [ 1100.440179][T17188] slab_reclaimable 135168 [ 1100.440179][T17188] slab_unreclaimable 200704 [ 1100.440179][T17188] pgfault 57222 [ 1100.440179][T17188] pgmajfault 0 [ 1100.440179][T17188] workingset_refault 0 [ 1100.440179][T17188] workingset_activate 0 [ 1100.440179][T17188] workingset_nodereclaim 0 [ 1100.440179][T17188] pgrefill 269 [ 1100.440179][T17188] pgscan 267 [ 1100.440179][T17188] pgsteal 33 [ 1100.440179][T17188] pgactivate 231 [ 1100.536657][T17188] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=17185,uid=0 [ 1100.552273][T17188] Memory cgroup out of memory: Killed process 17185 (syz-executor.1) total-vm:72852kB, anon-rss:4248kB, file-rss:35824kB, shmem-rss:0kB, UID:0 pgtables:147456kB oom_score_adj:1000 [ 1100.573704][ T1063] oom_reaper: reaped process 17185 (syz-executor.1), now anon-rss:0kB, file-rss:34864kB, shmem-rss:0kB 16:39:17 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:39:17 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:39:17 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:39:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000004c0)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:39:17 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:39:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000004c0)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) [ 1101.245084][T17178] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1101.268815][T17178] CPU: 0 PID: 17178 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1101.276806][T17178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1101.286871][T17178] Call Trace: [ 1101.290500][T17178] dump_stack+0xf5/0x159 [ 1101.294854][T17178] dump_header+0xaa/0x449 [ 1101.299222][T17178] oom_kill_process.cold+0x10/0x15 [ 1101.304378][T17178] out_of_memory+0x231/0xa00 [ 1101.308986][T17178] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1101.314743][T17178] mem_cgroup_out_of_memory+0x128/0x150 [ 1101.320404][T17178] try_charge+0xb3a/0xbc0 [ 1101.324791][T17178] ? rcu_note_context_switch+0x700/0x760 [ 1101.330451][T17178] mem_cgroup_try_charge+0xd2/0x260 [ 1101.335675][T17178] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1101.341343][T17178] wp_page_copy+0x322/0x1160 [ 1101.345954][T17178] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1101.351676][T17178] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1101.357386][T17178] do_wp_page+0x192/0x11f0 [ 1101.361889][T17178] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1101.367552][T17178] __handle_mm_fault+0x1c07/0x2cb0 [ 1101.372773][T17178] handle_mm_fault+0x21b/0x530 [ 1101.377574][T17178] __do_page_fault+0x3fb/0x9e0 [ 1101.382453][T17178] do_page_fault+0x54/0x233 [ 1101.386983][T17178] ? prepare_exit_to_usermode+0x154/0x1a0 [ 1101.392869][T17178] page_fault+0x34/0x40 [ 1101.397044][T17178] RIP: 0033:0x431016 [ 1101.400969][T17178] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 cc 5c 64 00 85 c0 0f 84 [ 1101.420591][T17178] RSP: 002b:00007ffee506e5f0 EFLAGS: 00010206 [ 1101.426716][T17178] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1101.434731][T17178] RDX: 0000000001647930 RSI: 000000000164f970 RDI: 0000000000000003 [ 1101.442844][T17178] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000001646940 [ 1101.450838][T17178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1101.458825][T17178] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 [ 1101.475825][T17178] memory: usage 268kB, limit 0kB, failcnt 854 [ 1101.482775][T17178] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1101.497808][T17178] Memory cgroup stats for /syz1: [ 1101.498114][T17178] anon 126976 [ 1101.498114][T17178] file 65536 [ 1101.498114][T17178] kernel_stack 0 [ 1101.498114][T17178] slab 335872 [ 1101.498114][T17178] sock 0 [ 1101.498114][T17178] shmem 0 [ 1101.498114][T17178] file_mapped 0 [ 1101.498114][T17178] file_dirty 0 [ 1101.498114][T17178] file_writeback 0 [ 1101.498114][T17178] anon_thp 0 [ 1101.498114][T17178] inactive_anon 135168 [ 1101.498114][T17178] active_anon 110592 [ 1101.498114][T17178] inactive_file 0 [ 1101.498114][T17178] active_file 0 [ 1101.498114][T17178] unevictable 135168 [ 1101.498114][T17178] slab_reclaimable 135168 [ 1101.498114][T17178] slab_unreclaimable 200704 [ 1101.498114][T17178] pgfault 57255 [ 1101.498114][T17178] pgmajfault 0 [ 1101.498114][T17178] workingset_refault 0 [ 1101.498114][T17178] workingset_activate 0 [ 1101.498114][T17178] workingset_nodereclaim 0 [ 1101.498114][T17178] pgrefill 269 [ 1101.498114][T17178] pgscan 267 [ 1101.498114][T17178] pgsteal 33 [ 1101.498114][T17178] pgactivate 231 16:39:17 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) [ 1101.593633][T17178] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=17178,uid=0 [ 1101.635010][T17178] Memory cgroup out of memory: Killed process 17178 (syz-executor.1) total-vm:72456kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 [ 1101.682354][ T1063] oom_reaper: reaped process 17178 (syz-executor.1), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 16:39:17 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000280008001c000100000000000000000000000000000000000010000002000000080002000000020008000100726564001c01020004010200b205a34f0459cc6abb699f4e08e3b1b5f75780560a59a8480dae55818041c02d8471389f5a076eaa787f8246aef232f41fb4fd095e664069035a011afb427b4799dc17338322cbd91968a88f2fbcbba734486e4d3c392ec5c40433021f006b4ddf02645062bacedcbcd61e4be8eea0e577dae0a23161a078fbdf38770e055341db2eca0ca565e8c92336422a57f6adad6ed581b27ccc9155e93c542353f1681423161cb1e44cc5b75a30515c051d3a8f0d2bcb9e9ebfa6290dd5fd8cd5150410922c3f86a3cee1d9e807ad3428f51c99eb16018bf7a6cd83dca6ff4af8a94fab0a1d86fded7a3835a987bd9f53499def9115ff45ce9d94aa0000000000000000140001000700000000000000000000000000000090755b1181d8ac64ad6e566b7b257541d4d4724304aa7f09742cb7aa1356d8a6ad0ffb6f29159b620809292345aed62b298e22129645d2c2df3a1049bb8561dc4bcf376aa1e40955892f428fef7bf7a683ebf60e73b5375d99d503b76a2eafe39c6e07a7ff905b71f6e41a8be26c62eb3d2530d15a1ab1d9ade93c7871a16f73894c05b9160fb84864e78c5ad2b627edd0d0393f66909ed0110ce53e3466384674a182dc5cf9e641af3ed8ad5f73c2061aef4a4f65c9ae577e81bff9f24354d65f4d1e7a5cf357bf520c903a35d6b21ca60a8728f6c2374d6070950331a750ce506b7fb85105121bba272f13b7e7692a525cf9855f6225739c944d37d257b902533ee7569e5d5df9c4673cdcaafaa26a75d5991552519f4500448ff3c95befb88ae00d"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:39:17 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0b01000408000000000000000000000000000000000000000800000000000000bb1153e6af9cd7b1ef65fac3b3cd6cd20a1f269ccf05c41692a6709b20dfa865407fde32a87a282c299f70e0bd50cb4809000000d0f3970729929dd758d941915b47c2a9b73e8e70be31d660c625ae235530ccd390b9a0a333cf2ef7330be96ab7e6db31afb0b44ced47bc6a91f8dc81c601000000000000007484b2724c4f472e0357f9fa7deddfb628e52a1b3ec279b2382305931d830c3c0027b5c47858fb16a20989c5bb0821bb7ef7a8cb6d2efe331705bb1d227376e06ac6cad52d2c30b173f738d65ca7cc9f890186d8701b975c9cb30e545b311628ee22b2c799bc3fb9c79f681f119d39f4cd37c3500c694ccf0000000000009029bb1618801b3f3c000000004e8e8bc665a987f44bf6a7f0728b662a05cca657aa6382b8fcc6672c550f660c5c371bd836b4042ea3d4def643a5ab3f17cd0000000000000000000000000000000000000000000000000000000000e6cc9c00000000000000000000000000001300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bf19e066d12850f00bda2ab100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ea0b37f52ec4ed91870f4b8940a9bddbe941420c855f3fbe63a05250fd13ec07c327c47cba0303f426054d157cee8387a44b9d278ff41713d4d8987c953aa6ded91b7bd6d6a393"], 0x51b) 16:39:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000004c0)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:39:18 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000380)={&(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="90000000000000002900000037000000060e0000000000000243326b06360eeba32588b09a79bc443b546b93ee51c1c3a5d263aa3c367d31f291d8de832487a1670c669bf473d66043af7e2fae784a0eff7792166217b2f30e2c8c1683c2040000000401050000000000c910000000000000000000000000000000010105000000000004018004010101010000000000"], 0x90}, 0x0) 16:39:18 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:39:18 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:39:18 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:39:18 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:39:18 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000001a00)=[{{&(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10, 0x0}}, {{&(0x7f0000000580)={0x2, 0x4e24, @dev}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x20, 0x0, 0x7, {[@timestamp={0x44, 0x10, 0x6, 0x3, 0x0, [{[], 0xfffffffa}, {}, {}]}]}}}], 0x20}}], 0x2, 0x0) [ 1102.535518][T14660] device bridge_slave_1 left promiscuous mode [ 1102.545247][T14660] bridge0: port 2(bridge_slave_1) entered disabled state [ 1102.615969][T14660] device bridge_slave_0 left promiscuous mode [ 1102.632315][T14660] bridge0: port 1(bridge_slave_0) entered disabled state [ 1104.035463][T14660] device hsr_slave_0 left promiscuous mode [ 1104.095071][T14660] device hsr_slave_1 left promiscuous mode [ 1104.152933][T14660] team0 (unregistering): Port device team_slave_1 removed [ 1104.165510][T14660] team0 (unregistering): Port device team_slave_0 removed [ 1104.176748][T14660] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1104.220369][T14660] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1104.283800][T14660] bond0 (unregistering): Released all slaves [ 1104.361894][T17326] IPVS: ftp: loaded support on port[0] = 21 [ 1104.465692][T17326] chnl_net:caif_netlink_parms(): no params data found [ 1104.562374][T17326] bridge0: port 1(bridge_slave_0) entered blocking state [ 1104.571084][T17326] bridge0: port 1(bridge_slave_0) entered disabled state [ 1104.582832][T17326] device bridge_slave_0 entered promiscuous mode [ 1104.599295][T17326] bridge0: port 2(bridge_slave_1) entered blocking state [ 1104.610756][T17326] bridge0: port 2(bridge_slave_1) entered disabled state [ 1104.622173][T17326] device bridge_slave_1 entered promiscuous mode [ 1104.641578][T17330] IPVS: ftp: loaded support on port[0] = 21 [ 1104.678323][T17326] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1104.704685][T17326] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1104.757751][T17326] team0: Port device team_slave_0 added [ 1104.785203][T17326] team0: Port device team_slave_1 added [ 1104.878149][T17326] device hsr_slave_0 entered promiscuous mode [ 1104.930067][T17326] device hsr_slave_1 entered promiscuous mode [ 1104.985011][T17326] debugfs: Directory 'hsr0' with parent '/' already present! [ 1105.006864][T17330] chnl_net:caif_netlink_parms(): no params data found [ 1105.038345][T17326] bridge0: port 2(bridge_slave_1) entered blocking state [ 1105.045528][T17326] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1105.052808][T17326] bridge0: port 1(bridge_slave_0) entered blocking state [ 1105.059935][T17326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1105.118078][T17330] bridge0: port 1(bridge_slave_0) entered blocking state [ 1105.130508][T17330] bridge0: port 1(bridge_slave_0) entered disabled state [ 1105.153552][T17330] device bridge_slave_0 entered promiscuous mode [ 1105.175443][T17330] bridge0: port 2(bridge_slave_1) entered blocking state [ 1105.182639][T17330] bridge0: port 2(bridge_slave_1) entered disabled state [ 1105.190692][T17330] device bridge_slave_1 entered promiscuous mode [ 1105.219744][T17326] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1105.234636][T17330] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1105.246344][T17330] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1105.276845][T17330] team0: Port device team_slave_0 added [ 1105.284132][T17330] team0: Port device team_slave_1 added [ 1105.307335][T17326] 8021q: adding VLAN 0 to HW filter on device team0 [ 1105.320381][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1105.329159][ T2912] bridge0: port 1(bridge_slave_0) entered disabled state [ 1105.337469][ T2912] bridge0: port 2(bridge_slave_1) entered disabled state [ 1105.417276][T17330] device hsr_slave_0 entered promiscuous mode [ 1105.455526][T17330] device hsr_slave_1 entered promiscuous mode [ 1105.525104][T17330] debugfs: Directory 'hsr0' with parent '/' already present! [ 1105.537589][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1105.546183][ T2912] bridge0: port 1(bridge_slave_0) entered blocking state [ 1105.553218][ T2912] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1105.569495][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1105.578206][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1105.587311][ T4358] bridge0: port 2(bridge_slave_1) entered blocking state [ 1105.594460][ T4358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1105.617803][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1105.627281][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1105.636963][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1105.646222][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1105.655621][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1105.664381][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1105.673526][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1105.682197][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1105.690728][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1105.699289][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1105.708119][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1105.717610][T17326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1105.763774][T17326] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1105.795240][T17330] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1105.809745][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1105.818857][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1105.830468][T17330] 8021q: adding VLAN 0 to HW filter on device team0 [ 1105.906280][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1105.915369][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1105.923871][ T2222] bridge0: port 1(bridge_slave_0) entered blocking state [ 1105.930925][ T2222] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1105.939996][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1105.949135][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1105.960309][ T2222] bridge0: port 2(bridge_slave_1) entered blocking state [ 1105.967396][ T2222] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1105.982358][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1105.992388][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1106.091334][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1106.102186][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1106.116739][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1106.136010][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1106.150789][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1106.234605][T17330] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1106.245295][T17330] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1106.259140][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1106.275661][T17340] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1106.293722][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1106.302976][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1106.310951][T17340] CPU: 1 PID: 17340 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1106.317684][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1106.318871][T17340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1106.327863][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1106.336790][T17340] Call Trace: [ 1106.336837][T17340] dump_stack+0xf5/0x159 [ 1106.345850][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1106.347828][T17340] dump_header+0xaa/0x449 [ 1106.363565][T17340] oom_kill_process.cold+0x10/0x15 [ 1106.368683][T17340] out_of_memory+0x231/0xa00 [ 1106.373404][T17340] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1106.379040][T17340] mem_cgroup_out_of_memory+0x128/0x150 [ 1106.384601][T17340] memory_max_write+0x17b/0x250 [ 1106.389564][T17340] cgroup_file_write+0x119/0x320 [ 1106.394560][T17340] ? high_work_func+0x30/0x30 [ 1106.399301][T17340] kernfs_fop_write+0x1f4/0x2e0 [ 1106.404145][T17340] ? cgroup_css.part.0+0x90/0x90 [ 1106.409086][T17340] __vfs_write+0x67/0xc0 [ 1106.413324][T17340] ? kernfs_seq_show+0xe0/0xe0 [ 1106.418076][T17340] vfs_write+0x18a/0x390 [ 1106.422330][T17340] ksys_write+0xd5/0x1b0 [ 1106.426563][T17340] __x64_sys_write+0x4c/0x60 [ 1106.431201][T17340] do_syscall_64+0xcc/0x370 [ 1106.435724][T17340] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1106.441597][T17340] RIP: 0033:0x459f39 [ 1106.445494][T17340] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1106.465086][T17340] RSP: 002b:00007fa673ec9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1106.473519][T17340] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1106.481491][T17340] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000b [ 1106.489492][T17340] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1106.497451][T17340] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa673eca6d4 [ 1106.505412][T17340] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1106.514738][T17340] memory: usage 4696kB, limit 0kB, failcnt 758 [ 1106.528749][T17340] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1106.538891][T17340] Memory cgroup stats for /syz3: [ 1106.539125][T17340] anon 4300800 [ 1106.539125][T17340] file 45056 [ 1106.539125][T17340] kernel_stack 36864 [ 1106.539125][T17340] slab 282624 [ 1106.539125][T17340] sock 0 [ 1106.539125][T17340] shmem 0 [ 1106.539125][T17340] file_mapped 0 [ 1106.539125][T17340] file_dirty 135168 [ 1106.539125][T17340] file_writeback 0 [ 1106.539125][T17340] anon_thp 4194304 [ 1106.539125][T17340] inactive_anon 0 [ 1106.539125][T17340] active_anon 4214784 [ 1106.539125][T17340] inactive_file 135168 [ 1106.539125][T17340] active_file 135168 [ 1106.539125][T17340] unevictable 135168 [ 1106.539125][T17340] slab_reclaimable 135168 [ 1106.539125][T17340] slab_unreclaimable 147456 [ 1106.539125][T17340] pgfault 53295 [ 1106.539125][T17340] pgmajfault 0 [ 1106.539125][T17340] workingset_refault 0 [ 1106.539125][T17340] workingset_activate 0 [ 1106.539125][T17340] workingset_nodereclaim 0 [ 1106.539125][T17340] pgrefill 198 [ 1106.539125][T17340] pgscan 198 [ 1106.539125][T17340] pgsteal 0 [ 1106.539125][T17340] pgactivate 198 [ 1106.636201][T17340] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=17337,uid=0 [ 1106.652514][T17340] Memory cgroup out of memory: Killed process 17337 (syz-executor.3) total-vm:72852kB, anon-rss:4248kB, file-rss:35824kB, shmem-rss:0kB, UID:0 pgtables:147456kB oom_score_adj:1000 [ 1106.676992][ T1063] oom_reaper: reaped process 17337 (syz-executor.3), now anon-rss:0kB, file-rss:34864kB, shmem-rss:0kB [ 1106.696688][T17330] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1107.121592][T17349] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1107.137439][T17349] CPU: 0 PID: 17349 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1107.145363][T17349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1107.155436][T17349] Call Trace: [ 1107.158766][T17349] dump_stack+0xf5/0x159 [ 1107.163037][T17349] dump_header+0xaa/0x449 [ 1107.167411][T17349] oom_kill_process.cold+0x10/0x15 [ 1107.172596][T17349] out_of_memory+0x231/0xa00 [ 1107.177223][T17349] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1107.182979][T17349] mem_cgroup_out_of_memory+0x128/0x150 [ 1107.188599][T17349] memory_max_write+0x17b/0x250 [ 1107.193487][T17349] cgroup_file_write+0x119/0x320 [ 1107.198502][T17349] ? high_work_func+0x30/0x30 [ 1107.203217][T17349] kernfs_fop_write+0x1f4/0x2e0 [ 1107.208172][T17349] ? cgroup_css.part.0+0x90/0x90 [ 1107.213226][T17349] __vfs_write+0x67/0xc0 [ 1107.217554][T17349] ? kernfs_seq_show+0xe0/0xe0 [ 1107.222341][T17349] vfs_write+0x18a/0x390 [ 1107.226664][T17349] ksys_write+0xd5/0x1b0 [ 1107.230932][T17349] __x64_sys_write+0x4c/0x60 [ 1107.235552][T17349] do_syscall_64+0xcc/0x370 [ 1107.240124][T17349] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1107.246021][T17349] RIP: 0033:0x459f39 [ 1107.249944][T17349] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1107.269560][T17349] RSP: 002b:00007f17b3467c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1107.277984][T17349] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1107.285970][T17349] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 1107.293977][T17349] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1107.301961][T17349] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f17b34686d4 [ 1107.310026][T17349] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1107.333948][T17349] memory: usage 4676kB, limit 0kB, failcnt 855 [ 1107.345271][T17349] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1107.352315][T17349] Memory cgroup stats for /syz1: [ 1107.352593][T17349] anon 4292608 [ 1107.352593][T17349] file 65536 [ 1107.352593][T17349] kernel_stack 36864 [ 1107.352593][T17349] slab 335872 [ 1107.352593][T17349] sock 0 [ 1107.352593][T17349] shmem 0 [ 1107.352593][T17349] file_mapped 0 [ 1107.352593][T17349] file_dirty 0 [ 1107.352593][T17349] file_writeback 0 [ 1107.352593][T17349] anon_thp 4194304 [ 1107.352593][T17349] inactive_anon 135168 [ 1107.352593][T17349] active_anon 4292608 [ 1107.352593][T17349] inactive_file 0 [ 1107.352593][T17349] active_file 0 [ 1107.352593][T17349] unevictable 135168 [ 1107.352593][T17349] slab_reclaimable 135168 [ 1107.352593][T17349] slab_unreclaimable 200704 [ 1107.352593][T17349] pgfault 57321 [ 1107.352593][T17349] pgmajfault 0 [ 1107.352593][T17349] workingset_refault 0 [ 1107.352593][T17349] workingset_activate 0 16:39:23 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:39:23 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:39:23 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r0, 0x0, 0x420000a77, 0x0) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfffffd88) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 16:39:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000004c0)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:39:23 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1107.352593][T17349] workingset_nodereclaim 0 [ 1107.352593][T17349] pgrefill 269 [ 1107.352593][T17349] pgscan 267 [ 1107.352593][T17349] pgsteal 33 [ 1107.352593][T17349] pgactivate 231 16:39:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000004c0)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) [ 1107.477281][T17349] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=17345,uid=0 [ 1107.523037][T17349] Memory cgroup out of memory: Killed process 17345 (syz-executor.1) total-vm:72852kB, anon-rss:4192kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:163840kB oom_score_adj:1000 16:39:23 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) [ 1107.584251][ T1063] oom_reaper: reaped process 17345 (syz-executor.1), now anon-rss:0kB, file-rss:34860kB, shmem-rss:0kB [ 1107.605340][T17326] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1107.625672][T14660] device bridge_slave_1 left promiscuous mode [ 1107.631911][T14660] bridge0: port 2(bridge_slave_1) entered disabled state [ 1107.637040][T17326] CPU: 1 PID: 17326 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1107.646845][T17326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1107.656918][T17326] Call Trace: [ 1107.660223][T17326] dump_stack+0xf5/0x159 [ 1107.664482][T17326] dump_header+0xaa/0x449 [ 1107.668845][T17326] oom_kill_process.cold+0x10/0x15 [ 1107.674018][T17326] out_of_memory+0x231/0xa00 [ 1107.678625][T17326] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1107.684293][T17326] mem_cgroup_out_of_memory+0x128/0x150 [ 1107.689881][T17326] try_charge+0xb3a/0xbc0 [ 1107.694243][T17326] ? rcu_note_context_switch+0x700/0x760 [ 1107.699923][T17326] mem_cgroup_try_charge+0xd2/0x260 [ 1107.705192][T17326] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1107.710892][T17326] wp_page_copy+0x322/0x1160 [ 1107.715508][T17326] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1107.721169][T17326] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1107.726841][T17326] do_wp_page+0x192/0x11f0 [ 1107.731381][T17326] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1107.737105][T17326] __handle_mm_fault+0x1c07/0x2cb0 [ 1107.742320][T17326] handle_mm_fault+0x21b/0x530 [ 1107.747112][T17326] __do_page_fault+0x3fb/0x9e0 [ 1107.751894][T17326] do_page_fault+0x54/0x233 [ 1107.756482][T17326] ? prepare_exit_to_usermode+0x154/0x1a0 [ 1107.762207][T17326] page_fault+0x34/0x40 [ 1107.766359][T17326] RIP: 0033:0x431016 [ 1107.770318][T17326] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 cc 5c 64 00 85 c0 0f 84 [ 1107.790595][T17326] RSP: 002b:00007ffd1729d770 EFLAGS: 00010206 [ 1107.796667][T17326] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1107.804651][T17326] RDX: 000000000171d930 RSI: 0000000001725970 RDI: 0000000000000003 [ 1107.812719][T17326] RBP: 0000000000008041 R08: 0000000000000001 R09: 000000000171c940 [ 1107.820720][T17326] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 16:39:23 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1107.828788][T17326] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 [ 1107.874576][T14660] device bridge_slave_0 left promiscuous mode [ 1107.891857][T14660] bridge0: port 1(bridge_slave_0) entered disabled state 16:39:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000004c0)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) [ 1107.938420][T17326] memory: usage 284kB, limit 0kB, failcnt 775 [ 1107.945616][T17326] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1107.952846][T17326] Memory cgroup stats for /syz3: [ 1107.953170][T17326] anon 106496 [ 1107.953170][T17326] file 45056 [ 1107.953170][T17326] kernel_stack 36864 [ 1107.953170][T17326] slab 282624 [ 1107.953170][T17326] sock 0 [ 1107.953170][T17326] shmem 0 [ 1107.953170][T17326] file_mapped 0 [ 1107.953170][T17326] file_dirty 135168 [ 1107.953170][T17326] file_writeback 0 [ 1107.953170][T17326] anon_thp 0 [ 1107.953170][T17326] inactive_anon 0 [ 1107.953170][T17326] active_anon 20480 [ 1107.953170][T17326] inactive_file 135168 [ 1107.953170][T17326] active_file 135168 [ 1107.953170][T17326] unevictable 135168 [ 1107.953170][T17326] slab_reclaimable 135168 [ 1107.953170][T17326] slab_unreclaimable 147456 [ 1107.953170][T17326] pgfault 53295 [ 1107.953170][T17326] pgmajfault 0 [ 1107.953170][T17326] workingset_refault 0 [ 1107.953170][T17326] workingset_activate 0 [ 1107.953170][T17326] workingset_nodereclaim 0 16:39:23 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:39:23 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) [ 1107.953170][T17326] pgrefill 198 [ 1107.953170][T17326] pgscan 198 [ 1107.953170][T17326] pgsteal 0 [ 1107.953170][T17326] pgactivate 198 [ 1108.091014][T17326] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=17326,uid=0 [ 1108.106950][T17326] Memory cgroup out of memory: Killed process 17326 (syz-executor.3) total-vm:72456kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 [ 1108.124801][T17330] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1108.125979][ T1063] oom_reaper: reaped process 17326 (syz-executor.3), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 1108.135223][T17330] CPU: 1 PID: 17330 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1108.153624][T17330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1108.163686][T17330] Call Trace: [ 1108.167007][T17330] dump_stack+0xf5/0x159 [ 1108.171286][T17330] dump_header+0xaa/0x449 [ 1108.175703][T17330] oom_kill_process.cold+0x10/0x15 [ 1108.180895][T17330] out_of_memory+0x231/0xa00 [ 1108.185501][T17330] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1108.191398][T17330] mem_cgroup_out_of_memory+0x128/0x150 [ 1108.196978][T17330] try_charge+0xb3a/0xbc0 [ 1108.201413][T17330] ? rcu_note_context_switch+0x700/0x760 [ 1108.207151][T17330] mem_cgroup_try_charge+0xd2/0x260 [ 1108.212382][T17330] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1108.219693][T17330] wp_page_copy+0x322/0x1160 [ 1108.224369][T17330] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1108.230101][T17330] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1108.235844][T17330] do_wp_page+0x192/0x11f0 [ 1108.240283][T17330] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1108.246035][T17330] __handle_mm_fault+0x1c07/0x2cb0 [ 1108.251176][T17330] handle_mm_fault+0x21b/0x530 [ 1108.256008][T17330] __do_page_fault+0x3fb/0x9e0 [ 1108.260798][T17330] do_page_fault+0x54/0x233 [ 1108.265337][T17330] ? prepare_exit_to_usermode+0x154/0x1a0 [ 1108.271092][T17330] page_fault+0x34/0x40 [ 1108.275249][T17330] RIP: 0033:0x431016 [ 1108.279171][T17330] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 cc 5c 64 00 85 c0 0f 84 [ 1108.298803][T17330] RSP: 002b:00007ffc50d14b50 EFLAGS: 00010206 [ 1108.304974][T17330] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1108.312976][T17330] RDX: 0000000000d45930 RSI: 0000000000d4d970 RDI: 0000000000000003 [ 1108.321112][T17330] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000000d44940 [ 1108.329150][T17330] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1108.337136][T17330] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 [ 1108.364940][T17330] memory: usage 252kB, limit 0kB, failcnt 871 [ 1108.371068][T17330] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1108.413840][T17330] Memory cgroup stats for /syz1: [ 1108.414064][T17330] anon 36864 [ 1108.414064][T17330] file 65536 [ 1108.414064][T17330] kernel_stack 36864 [ 1108.414064][T17330] slab 335872 [ 1108.414064][T17330] sock 0 [ 1108.414064][T17330] shmem 0 [ 1108.414064][T17330] file_mapped 0 [ 1108.414064][T17330] file_dirty 0 [ 1108.414064][T17330] file_writeback 0 [ 1108.414064][T17330] anon_thp 0 [ 1108.414064][T17330] inactive_anon 135168 [ 1108.414064][T17330] active_anon 36864 [ 1108.414064][T17330] inactive_file 0 16:39:24 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0b01000408000000000000000000000000000000000000000800000000000000bb1153e6af9cd7b1ef65fac3b3cd6cd20a1f269ccf05c41692a6709b20dfa865407fde32a87a282c299f70e0bd50cb4809000000d0f3970729929dd758d941915b47c2a9b73e8e70be31d660c625ae235530ccd390b9a0a333cf2ef7330be96ab7e6db31afb0b44ced47bc6a91f8dc81c601000000000000007484b2724c4f472e0357f9fa7deddfb628e52a1b3ec279b2382305931d830c3c0027b5c47858fb16a20989c5bb0821bb7ef7a8cb6d2efe331705bb1d227376e06ac6cad52d2c30b173f738d65ca7cc9f890186d8701b975c9cb30e545b311628ee22b2c799bc3fb9c79f681f119d39f4cd37c3500c694ccf0000000000009029bb1618801b3f3c000000004e8e8bc665a987f44bf6a7f0728b662a05cca657aa6382b8fcc6672c550f660c5c371bd836b4042ea3d4def643a5ab3f17cd0000000000000000000000000000000000000000000000000000000000e6cc9c00000000000000000000000000001300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bf19e066d12850f00bda2ab100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ea0b37f52ec4ed91870f4b8940a9bddbe941420c855f3fbe63a05250fd13ec07c327c47cba0303f426054d157cee8387a44b9d278ff41713d4d8987c953aa6ded91b7bd6d6a393"], 0x51b) [ 1108.414064][T17330] active_file 0 [ 1108.414064][T17330] unevictable 135168 [ 1108.414064][T17330] slab_reclaimable 135168 [ 1108.414064][T17330] slab_unreclaimable 200704 [ 1108.414064][T17330] pgfault 57354 [ 1108.414064][T17330] pgmajfault 0 [ 1108.414064][T17330] workingset_refault 0 [ 1108.414064][T17330] workingset_activate 0 [ 1108.414064][T17330] workingset_nodereclaim 0 [ 1108.414064][T17330] pgrefill 269 [ 1108.414064][T17330] pgscan 267 [ 1108.414064][T17330] pgsteal 33 [ 1108.414064][T17330] pgactivate 231 [ 1108.643919][T17330] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=17330,uid=0 [ 1108.687270][T17330] Memory cgroup out of memory: Killed process 17330 (syz-executor.1) total-vm:72456kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 [ 1108.715843][ T1063] oom_reaper: reaped process 17330 (syz-executor.1), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 1109.315187][T14660] device hsr_slave_0 left promiscuous mode [ 1109.355032][T14660] device hsr_slave_1 left promiscuous mode [ 1109.415217][T14660] team0 (unregistering): Port device team_slave_1 removed [ 1109.427074][T14660] team0 (unregistering): Port device team_slave_0 removed [ 1109.438380][T14660] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1109.489322][T14660] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1109.562642][T14660] bond0 (unregistering): Released all slaves 16:39:25 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:39:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000004c0)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:39:25 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x5eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x84000, 0x0) 16:39:25 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:39:25 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000280008001c000100000000000000000000000000000000000010000002000000080002000000020008000100726564001c01020004010200b205a34f0459cc6abb699f4e08e3b1b5f75780560a59a8480dae55818041c02d8471389f5a076eaa787f8246aef232f41fb4fd095e664069035a011afb427b4799dc17338322cbd91968a88f2fbcbba734486e4d3c392ec5c40433021f006b4ddf02645062bacedcbcd61e4be8eea0e577dae0a23161a078fbdf38770e055341db2eca0ca565e8c92336422a57f6adad6ed581b27ccc9155e93c542353f1681423161cb1e44cc5b75a30515c051d3a8f0d2bcb9e9ebfa6290dd5fd8cd5150410922c3f86a3cee1d9e807ad3428f51c99eb16018bf7a6cd83dca6ff4af8a94fab0a1d86fded7a3835a987bd9f53499def9115ff45ce9d94aa0000000000000000140001000700000000000000000000000000000090755b1181d8ac64ad6e566b7b257541d4d4724304aa7f09742cb7aa1356d8a6ad0ffb6f29159b620809292345aed62b298e22129645d2c2df3a1049bb8561dc4bcf376aa1e40955892f428fef7bf7a683ebf60e73b5375d99d503b76a2eafe39c6e07a7ff905b71f6e41a8be26c62eb3d2530d15a1ab1d9ade93c7871a16f73894c05b9160fb84864e78c5ad2b627edd0d0393f66909ed0110ce53e3466384674a182dc5cf9e641af3ed8ad5f73c2061aef4a4f65c9ae577e81bff9f24354d65f4d1e7a5cf357bf520c903a35d6b21ca60a8728f6c2374d6070950331a750ce506b7fb85105121bba272f13b7e7692a525cf9855f6225739c944d37d257b902533ee7569e5d5df9c4673cdcaafaa26a75d5991552519f4500448ff3c95befb88ae00d"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:39:25 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:39:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000004c0)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:39:25 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:39:26 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0b01000408000000000000000000000000000000000000000800000000000000bb1153e6af9cd7b1ef65fac3b3cd6cd20a1f269ccf05c41692a6709b20dfa865407fde32a87a282c299f70e0bd50cb4809000000d0f3970729929dd758d941915b47c2a9b73e8e70be31d660c625ae235530ccd390b9a0a333cf2ef7330be96ab7e6db31afb0b44ced47bc6a91f8dc81c601000000000000007484b2724c4f472e0357f9fa7deddfb628e52a1b3ec279b2382305931d830c3c0027b5c47858fb16a20989c5bb0821bb7ef7a8cb6d2efe331705bb1d227376e06ac6cad52d2c30b173f738d65ca7cc9f890186d8701b975c9cb30e545b311628ee22b2c799bc3fb9c79f681f119d39f4cd37c3500c694ccf0000000000009029bb1618801b3f3c000000004e8e8bc665a987f44bf6a7f0728b662a05cca657aa6382b8fcc6672c550f660c5c371bd836b4042ea3d4def643a5ab3f17cd0000000000000000000000000000000000000000000000000000000000e6cc9c00000000000000000000000000001300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bf19e066d12850f00bda2ab100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ea0b37f52ec4ed91870f4b8940a9bddbe941420c855f3fbe63a05250fd13ec07c327c47cba0303f426054d157cee8387a44b9d278ff41713d4d8987c953aa6ded91b7bd6d6a393"], 0x51b) 16:39:26 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000280008001c000100000000000000000000000000000000000010000002000000080002000000020008000100726564001c01020004010200b205a34f0459cc6abb699f4e08e3b1b5f75780560a59a8480dae55818041c02d8471389f5a076eaa787f8246aef232f41fb4fd095e664069035a011afb427b4799dc17338322cbd91968a88f2fbcbba734486e4d3c392ec5c40433021f006b4ddf02645062bacedcbcd61e4be8eea0e577dae0a23161a078fbdf38770e055341db2eca0ca565e8c92336422a57f6adad6ed581b27ccc9155e93c542353f1681423161cb1e44cc5b75a30515c051d3a8f0d2bcb9e9ebfa6290dd5fd8cd5150410922c3f86a3cee1d9e807ad3428f51c99eb16018bf7a6cd83dca6ff4af8a94fab0a1d86fded7a3835a987bd9f53499def9115ff45ce9d94aa0000000000000000140001000700000000000000000000000000000090755b1181d8ac64ad6e566b7b257541d4d4724304aa7f09742cb7aa1356d8a6ad0ffb6f29159b620809292345aed62b298e22129645d2c2df3a1049bb8561dc4bcf376aa1e40955892f428fef7bf7a683ebf60e73b5375d99d503b76a2eafe39c6e07a7ff905b71f6e41a8be26c62eb3d2530d15a1ab1d9ade93c7871a16f73894c05b9160fb84864e78c5ad2b627edd0d0393f66909ed0110ce53e3466384674a182dc5cf9e641af3ed8ad5f73c2061aef4a4f65c9ae577e81bff9f24354d65f4d1e7a5cf357bf520c903a35d6b21ca60a8728f6c2374d6070950331a750ce506b7fb85105121bba272f13b7e7692a525cf9855f6225739c944d37d257b902533ee7569e5d5df9c4673cdcaafaa26a75d5991552519f4500448ff3c95befb88ae00d"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:39:26 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:39:26 executing program 0: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) r1 = socket$kcm(0x2, 0x2, 0x73) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000000)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0x0) sendmsg$kcm(r1, &(0x7f0000000100)={&(0x7f0000000000)=@rc={0x1f, {0x6, 0x0, 0x90, 0x7}}, 0x80, &(0x7f0000000080)}, 0x4000) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000680)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 16:39:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000004c0)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:39:26 executing program 4: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(0xffffffffffffffff, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="0b01000408000000000000000000000000000000000000000800000000000000bb1153e6af9cd7b1ef65fac3b3cd6cd20a1f269ccf05c41692a6709b20dfa865407fde32a87a282c299f70e0bd50cb4809000000d0f3970729929dd758d941915b47c2a9b73e8e70be31d660c625ae235530ccd390b9a0a333cf2ef7330be96ab7e6db31afb0b44ced47bc6a91f8dc81c601000000000000007484b2724c4f472e0357f9fa7deddfb628e52a1b3ec279b2382305931d830c3c0027b5c47858fb16a20989c5bb0821bb7ef7a8cb6d2efe331705bb1d227376e06ac6cad52d2c30b173f738d65ca7cc9f890186d8701b975c9cb30e545b311628ee22b2c799bc3fb9c79f681f119d39f4cd37c3500c694ccf0000000000009029bb1618801b3f3c000000004e8e8bc665a987f44bf6a7f0728b662a05cca657aa6382b8fcc6672c550f660c5c371bd836b4042ea3d4def643a5ab3f17cd0000000000000000000000000000000000000000000000000000000000e6cc9c00000000000000000000000000001300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bf19e066d12850f00bda2ab100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ea0b37f52ec4ed91870f4b8940a9bddbe941420c855f3fbe63a05250fd13ec07c327c47cba0303f426054d157cee8387a44b9d278ff41713d4d8987c953aa6ded91b7bd6d6a393"], 0x51b) 16:39:26 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:39:26 executing program 0: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) r1 = socket$kcm(0x2, 0x2, 0x73) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000000)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0x0) sendmsg$kcm(r1, &(0x7f0000000100)={&(0x7f0000000000)=@rc={0x1f, {0x6, 0x0, 0x90, 0x7}}, 0x80, &(0x7f0000000080)}, 0x4000) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000680)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 16:39:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000004c0)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:39:26 executing program 4: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(0xffffffffffffffff, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:39:27 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000280008001c000100000000000000000000000000000000000010000002000000080002000000020008000100726564001c01020004010200b205a34f0459cc6abb699f4e08e3b1b5f75780560a59a8480dae55818041c02d8471389f5a076eaa787f8246aef232f41fb4fd095e664069035a011afb427b4799dc17338322cbd91968a88f2fbcbba734486e4d3c392ec5c40433021f006b4ddf02645062bacedcbcd61e4be8eea0e577dae0a23161a078fbdf38770e055341db2eca0ca565e8c92336422a57f6adad6ed581b27ccc9155e93c542353f1681423161cb1e44cc5b75a30515c051d3a8f0d2bcb9e9ebfa6290dd5fd8cd5150410922c3f86a3cee1d9e807ad3428f51c99eb16018bf7a6cd83dca6ff4af8a94fab0a1d86fded7a3835a987bd9f53499def9115ff45ce9d94aa0000000000000000140001000700000000000000000000000000000090755b1181d8ac64ad6e566b7b257541d4d4724304aa7f09742cb7aa1356d8a6ad0ffb6f29159b620809292345aed62b298e22129645d2c2df3a1049bb8561dc4bcf376aa1e40955892f428fef7bf7a683ebf60e73b5375d99d503b76a2eafe39c6e07a7ff905b71f6e41a8be26c62eb3d2530d15a1ab1d9ade93c7871a16f73894c05b9160fb84864e78c5ad2b627edd0d0393f66909ed0110ce53e3466384674a182dc5cf9e641af3ed8ad5f73c2061aef4a4f65c9ae577e81bff9f24354d65f4d1e7a5cf357bf520c903a35d6b21ca60a8728f6c2374d6070950331a750ce506b7fb85105121bba272f13b7e7692a525cf9855f6225739c944d37d257b902533ee7569e5d5df9c4673cdcaafaa26a75d5991552519f4500448ff3c95befb88ae00d"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1112.750459][T17432] IPVS: ftp: loaded support on port[0] = 21 [ 1112.813658][T17432] chnl_net:caif_netlink_parms(): no params data found [ 1112.844077][T17432] bridge0: port 1(bridge_slave_0) entered blocking state [ 1112.851316][T17432] bridge0: port 1(bridge_slave_0) entered disabled state [ 1112.859436][T17432] device bridge_slave_0 entered promiscuous mode [ 1112.980741][T17432] bridge0: port 2(bridge_slave_1) entered blocking state [ 1112.988059][T17432] bridge0: port 2(bridge_slave_1) entered disabled state [ 1112.996168][T17432] device bridge_slave_1 entered promiscuous mode [ 1113.014266][T17432] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1113.083971][T17432] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1113.105393][T17432] team0: Port device team_slave_0 added [ 1113.171137][T17432] team0: Port device team_slave_1 added [ 1113.218426][T17432] device hsr_slave_0 entered promiscuous mode [ 1113.255640][T17432] device hsr_slave_1 entered promiscuous mode [ 1113.295010][T17432] debugfs: Directory 'hsr0' with parent '/' already present! [ 1113.394628][T17432] bridge0: port 2(bridge_slave_1) entered blocking state [ 1113.396068][T17435] IPVS: ftp: loaded support on port[0] = 21 [ 1113.401752][T17432] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1113.415102][T17432] bridge0: port 1(bridge_slave_0) entered blocking state [ 1113.422207][T17432] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1113.629632][T17435] chnl_net:caif_netlink_parms(): no params data found [ 1113.726584][T17435] bridge0: port 1(bridge_slave_0) entered blocking state [ 1113.733739][T17435] bridge0: port 1(bridge_slave_0) entered disabled state [ 1113.742109][T17435] device bridge_slave_0 entered promiscuous mode [ 1113.809135][T17435] bridge0: port 2(bridge_slave_1) entered blocking state [ 1113.816790][T17435] bridge0: port 2(bridge_slave_1) entered disabled state [ 1113.824755][T17435] device bridge_slave_1 entered promiscuous mode [ 1113.839252][ T4358] bridge0: port 1(bridge_slave_0) entered disabled state [ 1113.847605][ T4358] bridge0: port 2(bridge_slave_1) entered disabled state [ 1113.862966][T17432] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1113.939326][T17435] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1113.950696][T17435] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1113.972745][T14660] device bridge_slave_1 left promiscuous mode [ 1113.983543][T14660] bridge0: port 2(bridge_slave_1) entered disabled state [ 1114.025645][T14660] device bridge_slave_0 left promiscuous mode [ 1114.031820][T14660] bridge0: port 1(bridge_slave_0) entered disabled state [ 1114.076797][T14660] device bridge_slave_1 left promiscuous mode [ 1114.083028][T14660] bridge0: port 2(bridge_slave_1) entered disabled state [ 1114.115940][T14660] device bridge_slave_0 left promiscuous mode [ 1114.122139][T14660] bridge0: port 1(bridge_slave_0) entered disabled state [ 1115.635741][T14660] device hsr_slave_0 left promiscuous mode [ 1115.695146][T14660] device hsr_slave_1 left promiscuous mode [ 1115.744356][T14660] team0 (unregistering): Port device team_slave_1 removed [ 1115.755723][T14660] team0 (unregistering): Port device team_slave_0 removed [ 1115.766613][T14660] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1115.810108][T14660] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1115.873380][T14660] bond0 (unregistering): Released all slaves [ 1116.005495][T14660] device hsr_slave_0 left promiscuous mode [ 1116.045150][T14660] device hsr_slave_1 left promiscuous mode [ 1116.093902][T14660] team0 (unregistering): Port device team_slave_1 removed [ 1116.105212][T14660] team0 (unregistering): Port device team_slave_0 removed [ 1116.116146][T14660] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1116.170479][T14660] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1116.252545][T14660] bond0 (unregistering): Released all slaves [ 1116.322208][T17432] 8021q: adding VLAN 0 to HW filter on device team0 [ 1116.330434][T17435] team0: Port device team_slave_0 added [ 1116.337795][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1116.345664][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1116.361928][T17435] team0: Port device team_slave_1 added [ 1116.368930][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1116.377862][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1116.386474][ T4358] bridge0: port 1(bridge_slave_0) entered blocking state [ 1116.393504][ T4358] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1116.401639][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1116.410481][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1116.419031][ T4358] bridge0: port 2(bridge_slave_1) entered blocking state [ 1116.426085][ T4358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1116.434056][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1116.452629][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1116.461982][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1116.471388][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1116.480362][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1116.489258][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1116.499228][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1116.578199][T17435] device hsr_slave_0 entered promiscuous mode [ 1116.645230][T17435] device hsr_slave_1 entered promiscuous mode [ 1116.695089][T17435] debugfs: Directory 'hsr0' with parent '/' already present! [ 1116.710398][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1116.719307][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1116.733989][T17432] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1116.746008][T17432] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1116.754094][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1116.763005][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1116.883004][T17432] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1116.903388][T17435] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1116.931226][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1116.944598][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1116.955885][T17435] 8021q: adding VLAN 0 to HW filter on device team0 [ 1116.971648][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1116.990335][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1117.004112][ T7243] bridge0: port 1(bridge_slave_0) entered blocking state [ 1117.011283][ T7243] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1117.051135][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1117.064400][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1117.073894][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1117.088556][ T2912] bridge0: port 2(bridge_slave_1) entered blocking state [ 1117.095737][ T2912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1117.109725][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1117.120198][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1117.133917][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1117.144154][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1117.170864][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1117.182006][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1117.193950][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1117.208328][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1117.219949][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1117.236276][T17435] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1117.282158][T17435] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1117.602439][T17452] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1117.635639][T17452] CPU: 1 PID: 17452 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1117.643599][T17452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1117.653663][T17452] Call Trace: [ 1117.656983][T17452] dump_stack+0xf5/0x159 [ 1117.661393][T17452] dump_header+0xaa/0x449 [ 1117.665754][T17452] oom_kill_process.cold+0x10/0x15 [ 1117.670908][T17452] out_of_memory+0x231/0xa00 [ 1117.675516][T17452] ? preempt_schedule_common+0x37/0x90 [ 1117.681008][T17452] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1117.686800][T17452] mem_cgroup_out_of_memory+0x128/0x150 [ 1117.692386][T17452] memory_max_write+0x17b/0x250 [ 1117.697326][T17452] cgroup_file_write+0x119/0x320 [ 1117.702306][T17452] ? high_work_func+0x30/0x30 [ 1117.707011][T17452] kernfs_fop_write+0x1f4/0x2e0 [ 1117.711898][T17452] ? cgroup_css.part.0+0x90/0x90 [ 1117.717239][T17452] __vfs_write+0x67/0xc0 [ 1117.721507][T17452] ? kernfs_seq_show+0xe0/0xe0 [ 1117.726347][T17452] vfs_write+0x18a/0x390 [ 1117.730601][T17452] ksys_write+0xd5/0x1b0 [ 1117.734895][T17452] __x64_sys_write+0x4c/0x60 [ 1117.739505][T17452] do_syscall_64+0xcc/0x370 [ 1117.744078][T17452] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1117.749990][T17452] RIP: 0033:0x459f39 [ 1117.754056][T17452] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1117.773764][T17452] RSP: 002b:00007f6908915c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1117.782185][T17452] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1117.790335][T17452] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000b [ 1117.798324][T17452] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1117.806309][T17452] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69089166d4 [ 1117.814289][T17452] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1117.836725][T17452] memory: usage 4688kB, limit 0kB, failcnt 784 [ 1117.842979][T17452] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1117.855750][T17452] Memory cgroup stats for /syz3: [ 1117.856124][T17452] anon 4317184 [ 1117.856124][T17452] file 45056 [ 1117.856124][T17452] kernel_stack 73728 [ 1117.856124][T17452] slab 282624 [ 1117.856124][T17452] sock 0 [ 1117.856124][T17452] shmem 0 [ 1117.856124][T17452] file_mapped 0 [ 1117.856124][T17452] file_dirty 135168 [ 1117.856124][T17452] file_writeback 0 [ 1117.856124][T17452] anon_thp 4194304 [ 1117.856124][T17452] inactive_anon 0 [ 1117.856124][T17452] active_anon 4317184 [ 1117.856124][T17452] inactive_file 135168 [ 1117.856124][T17452] active_file 135168 [ 1117.856124][T17452] unevictable 135168 [ 1117.856124][T17452] slab_reclaimable 135168 [ 1117.856124][T17452] slab_unreclaimable 147456 [ 1117.856124][T17452] pgfault 53361 [ 1117.856124][T17452] pgmajfault 0 [ 1117.856124][T17452] workingset_refault 0 [ 1117.856124][T17452] workingset_activate 0 [ 1117.856124][T17452] workingset_nodereclaim 0 [ 1117.856124][T17452] pgrefill 198 [ 1117.856124][T17452] pgscan 198 [ 1117.856124][T17452] pgsteal 0 [ 1117.856124][T17452] pgactivate 198 [ 1117.988470][T17452] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=17442,uid=0 [ 1118.004301][T17452] Memory cgroup out of memory: Killed process 17442 (syz-executor.3) total-vm:72852kB, anon-rss:4248kB, file-rss:35824kB, shmem-rss:0kB, UID:0 pgtables:147456kB oom_score_adj:1000 [ 1118.057801][ T1063] oom_reaper: reaped process 17442 (syz-executor.3), now anon-rss:0kB, file-rss:34864kB, shmem-rss:0kB [ 1118.118054][T17454] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1118.153836][T17454] CPU: 0 PID: 17454 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 16:39:34 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:39:34 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg(0xffffffffffffffff, 0x0, 0x40) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x80086603, 0x20000000) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x80086603, 0x20000000) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000003c0)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000dc0)={0xffffffffffffffff, &(0x7f0000000c00)="4b814e8f529005bf8419525bcbafc7ac20dc6def7cf60fe0f472a4739ca00f1574ffc8e7603d6ca1db46884c813f22b04afb40da4867eb282deeb8b113e866bbb332", &(0x7f0000000d00)}, 0x20) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.s\x01@\x00\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x44) socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)=0x1000100) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 16:39:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000004c0)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) [ 1118.161821][T17454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1118.171889][T17454] Call Trace: [ 1118.175273][T17454] dump_stack+0xf5/0x159 [ 1118.179607][T17454] dump_header+0xaa/0x449 [ 1118.184087][T17454] oom_kill_process.cold+0x10/0x15 [ 1118.189224][T17454] out_of_memory+0x231/0xa00 [ 1118.193839][T17454] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1118.199538][T17454] mem_cgroup_out_of_memory+0x128/0x150 [ 1118.205176][T17454] memory_max_write+0x17b/0x250 [ 1118.210055][T17454] cgroup_file_write+0x119/0x320 [ 1118.215038][T17454] ? high_work_func+0x30/0x30 [ 1118.219750][T17454] kernfs_fop_write+0x1f4/0x2e0 [ 1118.224699][T17454] ? cgroup_css.part.0+0x90/0x90 [ 1118.229696][T17454] __vfs_write+0x67/0xc0 [ 1118.234049][T17454] ? kernfs_seq_show+0xe0/0xe0 [ 1118.238852][T17454] vfs_write+0x18a/0x390 [ 1118.243239][T17454] ksys_write+0xd5/0x1b0 [ 1118.247508][T17454] __x64_sys_write+0x4c/0x60 [ 1118.252202][T17454] do_syscall_64+0xcc/0x370 [ 1118.256758][T17454] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1118.262666][T17454] RIP: 0033:0x459f39 [ 1118.266590][T17454] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1118.286224][T17454] RSP: 002b:00007f8c6d010c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1118.294807][T17454] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1118.302841][T17454] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 1118.310855][T17454] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1118.318829][T17454] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8c6d0116d4 [ 1118.326980][T17454] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1118.360926][T17454] memory: usage 4664kB, limit 0kB, failcnt 880 [ 1118.373170][T17454] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1118.404350][T17454] Memory cgroup stats for /syz1: [ 1118.404637][T17454] anon 4317184 [ 1118.404637][T17454] file 65536 [ 1118.404637][T17454] kernel_stack 73728 [ 1118.404637][T17454] slab 335872 [ 1118.404637][T17454] sock 0 [ 1118.404637][T17454] shmem 0 [ 1118.404637][T17454] file_mapped 0 [ 1118.404637][T17454] file_dirty 0 [ 1118.404637][T17454] file_writeback 0 [ 1118.404637][T17454] anon_thp 4194304 [ 1118.404637][T17454] inactive_anon 135168 [ 1118.404637][T17454] active_anon 4317184 [ 1118.404637][T17454] inactive_file 0 [ 1118.404637][T17454] active_file 0 [ 1118.404637][T17454] unevictable 135168 [ 1118.404637][T17454] slab_reclaimable 135168 [ 1118.404637][T17454] slab_unreclaimable 200704 [ 1118.404637][T17454] pgfault 57420 [ 1118.404637][T17454] pgmajfault 0 [ 1118.404637][T17454] workingset_refault 0 [ 1118.404637][T17454] workingset_activate 0 [ 1118.404637][T17454] workingset_nodereclaim 0 [ 1118.404637][T17454] pgrefill 269 [ 1118.404637][T17454] pgscan 267 [ 1118.404637][T17454] pgsteal 33 [ 1118.404637][T17454] pgactivate 231 [ 1118.505359][T17454] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=17449,uid=0 [ 1118.521657][T17454] Memory cgroup out of memory: Killed process 17454 (syz-executor.1) total-vm:72852kB, anon-rss:4252kB, file-rss:35836kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 1118.551426][T17432] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1118.575007][T17432] CPU: 0 PID: 17432 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1118.582931][T17432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1118.592987][T17432] Call Trace: [ 1118.596365][T17432] dump_stack+0xf5/0x159 [ 1118.600633][T17432] dump_header+0xaa/0x449 [ 1118.605011][T17432] oom_kill_process.cold+0x10/0x15 [ 1118.610156][T17432] out_of_memory+0x231/0xa00 [ 1118.614790][T17432] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1118.620458][T17432] mem_cgroup_out_of_memory+0x128/0x150 [ 1118.626141][T17432] try_charge+0xb3a/0xbc0 [ 1118.630492][T17432] ? rcu_note_context_switch+0x700/0x760 [ 1118.636200][T17432] mem_cgroup_try_charge+0xd2/0x260 [ 1118.641418][T17432] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1118.647268][T17432] wp_page_copy+0x322/0x1160 [ 1118.651878][T17432] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1118.658320][T17432] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1118.664077][T17432] do_wp_page+0x192/0x11f0 [ 1118.668506][T17432] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1118.674160][T17432] __handle_mm_fault+0x1c07/0x2cb0 [ 1118.679334][T17432] handle_mm_fault+0x21b/0x530 [ 1118.684129][T17432] __do_page_fault+0x3fb/0x9e0 [ 1118.689025][T17432] do_page_fault+0x54/0x233 [ 1118.693572][T17432] ? prepare_exit_to_usermode+0x154/0x1a0 [ 1118.699320][T17432] page_fault+0x34/0x40 [ 1118.703484][T17432] RIP: 0033:0x431016 [ 1118.707499][T17432] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 cc 5c 64 00 85 c0 0f 84 [ 1118.727149][T17432] RSP: 002b:00007ffd7b66b550 EFLAGS: 00010206 [ 1118.733334][T17432] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1118.741475][T17432] RDX: 000000000221c930 RSI: 0000000002224970 RDI: 0000000000000003 16:39:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003a0081aee4050cecdb4cb9040a485e510befccdf7f3e9cf0758ef900e1cf3aebb1cb4c100c0003720000", 0x2e}], 0x1}, 0x0) 16:39:34 executing program 4: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(0xffffffffffffffff, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="0b01000408000000000000000000000000000000000000000800000000000000bb1153e6af9cd7b1ef65fac3b3cd6cd20a1f269ccf05c41692a6709b20dfa865407fde32a87a282c299f70e0bd50cb4809000000d0f3970729929dd758d941915b47c2a9b73e8e70be31d660c625ae235530ccd390b9a0a333cf2ef7330be96ab7e6db31afb0b44ced47bc6a91f8dc81c601000000000000007484b2724c4f472e0357f9fa7deddfb628e52a1b3ec279b2382305931d830c3c0027b5c47858fb16a20989c5bb0821bb7ef7a8cb6d2efe331705bb1d227376e06ac6cad52d2c30b173f738d65ca7cc9f890186d8701b975c9cb30e545b311628ee22b2c799bc3fb9c79f681f119d39f4cd37c3500c694ccf0000000000009029bb1618801b3f3c000000004e8e8bc665a987f44bf6a7f0728b662a05cca657aa6382b8fcc6672c550f660c5c371bd836b4042ea3d4def643a5ab3f17cd0000000000000000000000000000000000000000000000000000000000e6cc9c00000000000000000000000000001300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bf19e066d12850f00bda2ab100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ea0b37f52ec4ed91870f4b8940a9bddbe941420c855f3fbe63a05250fd13ec07c327c47cba0303f426054d157cee8387a44b9d278ff41713d4d8987c953aa6ded91b7bd6d6a393"], 0x51b) 16:39:34 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000280008001c000100000000000000000000000000000000000010000002000000080002000000020008000100726564001c01020004010200b205a34f0459cc6abb699f4e08e3b1b5f75780560a59a8480dae55818041c02d8471389f5a076eaa787f8246aef232f41fb4fd095e664069035a011afb427b4799dc17338322cbd91968a88f2fbcbba734486e4d3c392ec5c40433021f006b4ddf02645062bacedcbcd61e4be8eea0e577dae0a23161a078fbdf38770e055341db2eca0ca565e8c92336422a57f6adad6ed581b27ccc9155e93c542353f1681423161cb1e44cc5b75a30515c051d3a8f0d2bcb9e9ebfa6290dd5fd8cd5150410922c3f86a3cee1d9e807ad3428f51c99eb16018bf7a6cd83dca6ff4af8a94fab0a1d86fded7a3835a987bd9f53499def9115ff45ce9d94aa0000000000000000140001000700000000000000000000000000000090755b1181d8ac64ad6e566b7b257541d4d4724304aa7f09742cb7aa1356d8a6ad0ffb6f29159b620809292345aed62b298e22129645d2c2df3a1049bb8561dc4bcf376aa1e40955892f428fef7bf7a683ebf60e73b5375d99d503b76a2eafe39c6e07a7ff905b71f6e41a8be26c62eb3d2530d15a1ab1d9ade93c7871a16f73894c05b9160fb84864e78c5ad2b627edd0d0393f66909ed0110ce53e3466384674a182dc5cf9e641af3ed8ad5f73c2061aef4a4f65c9ae577e81bff9f24354d65f4d1e7a5cf357bf520c903a35d6b21ca60a8728f6c2374d6070950331a750ce506b7fb85105121bba272f13b7e7692a525cf9855f6225739c944d37d257b902533ee7569e5d5df9c4673cdcaafaa26a75d5991552519f4500448ff3c95befb88ae00d"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:39:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000004c0)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:39:34 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) [ 1118.749456][T17432] RBP: 0000000000008041 R08: 0000000000000001 R09: 000000000221b940 [ 1118.757446][T17432] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1118.765487][T17432] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 [ 1118.785069][T17432] memory: usage 276kB, limit 0kB, failcnt 801 [ 1118.791176][T17432] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1118.814811][T17432] Memory cgroup stats for /syz3: [ 1118.819418][T17432] anon 36864 [ 1118.819418][T17432] file 45056 [ 1118.819418][T17432] kernel_stack 36864 [ 1118.819418][T17432] slab 282624 [ 1118.819418][T17432] sock 0 [ 1118.819418][T17432] shmem 0 [ 1118.819418][T17432] file_mapped 0 [ 1118.819418][T17432] file_dirty 135168 [ 1118.819418][T17432] file_writeback 0 [ 1118.819418][T17432] anon_thp 0 [ 1118.819418][T17432] inactive_anon 0 [ 1118.819418][T17432] active_anon 36864 [ 1118.819418][T17432] inactive_file 135168 16:39:34 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1118.819418][T17432] active_file 135168 [ 1118.819418][T17432] unevictable 135168 [ 1118.819418][T17432] slab_reclaimable 135168 [ 1118.819418][T17432] slab_unreclaimable 147456 [ 1118.819418][T17432] pgfault 53394 [ 1118.819418][T17432] pgmajfault 0 [ 1118.819418][T17432] workingset_refault 0 [ 1118.819418][T17432] workingset_activate 0 [ 1118.819418][T17432] workingset_nodereclaim 0 [ 1118.819418][T17432] pgrefill 198 [ 1118.819418][T17432] pgscan 198 [ 1118.819418][T17432] pgsteal 0 [ 1118.819418][T17432] pgactivate 198 16:39:34 executing program 4: r0 = socket(0x0, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:39:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000004c0)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:39:35 executing program 0: r0 = syz_open_dev$midi(&(0x7f00000007c0)='/dev/midi#\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) [ 1119.223851][T17432] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=17432,uid=0 [ 1119.362219][T17432] Memory cgroup out of memory: Killed process 17432 (syz-executor.3) total-vm:72456kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 [ 1119.423090][ T1063] oom_reaper: reaped process 17432 (syz-executor.3), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 1119.435125][T17435] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1119.448845][T17435] CPU: 0 PID: 17435 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1119.456829][T17435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1119.466885][T17435] Call Trace: [ 1119.470286][T17435] dump_stack+0xf5/0x159 [ 1119.474731][T17435] dump_header+0xaa/0x449 [ 1119.479204][T17435] oom_kill_process.cold+0x10/0x15 [ 1119.484360][T17435] out_of_memory+0x231/0xa00 [ 1119.488975][T17435] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1119.494644][T17435] mem_cgroup_out_of_memory+0x128/0x150 [ 1119.500229][T17435] try_charge+0xb3a/0xbc0 [ 1119.504610][T17435] ? rcu_note_context_switch+0x700/0x760 [ 1119.510442][T17435] mem_cgroup_try_charge+0xd2/0x260 [ 1119.515761][T17435] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1119.521482][T17435] wp_page_copy+0x322/0x1160 [ 1119.526083][T17435] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1119.531746][T17435] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1119.537411][T17435] do_wp_page+0x192/0x11f0 [ 1119.541832][T17435] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1119.547517][T17435] __handle_mm_fault+0x1c07/0x2cb0 [ 1119.552671][T17435] handle_mm_fault+0x21b/0x530 [ 1119.557450][T17435] __do_page_fault+0x3fb/0x9e0 [ 1119.562380][T17435] do_page_fault+0x54/0x233 [ 1119.567005][T17435] ? prepare_exit_to_usermode+0x154/0x1a0 [ 1119.572800][T17435] page_fault+0x34/0x40 [ 1119.576944][T17435] RIP: 0033:0x431016 [ 1119.580858][T17435] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 cc 5c 64 00 85 c0 0f 84 [ 1119.600459][T17435] RSP: 002b:00007ffc7caf61e0 EFLAGS: 00010206 [ 1119.606548][T17435] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1119.614517][T17435] RDX: 0000000001d1e930 RSI: 0000000001d26970 RDI: 0000000000000003 [ 1119.622473][T17435] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000001d1d940 [ 1119.630461][T17435] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1119.638430][T17435] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 [ 1119.646818][T17435] memory: usage 260kB, limit 0kB, failcnt 889 [ 1119.652982][T17435] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1119.659866][T17435] Memory cgroup stats for /syz1: [ 1119.660144][T17435] anon 69632 [ 1119.660144][T17435] file 65536 [ 1119.660144][T17435] kernel_stack 36864 [ 1119.660144][T17435] slab 335872 [ 1119.660144][T17435] sock 0 [ 1119.660144][T17435] shmem 0 [ 1119.660144][T17435] file_mapped 0 [ 1119.660144][T17435] file_dirty 0 [ 1119.660144][T17435] file_writeback 0 [ 1119.660144][T17435] anon_thp 0 [ 1119.660144][T17435] inactive_anon 135168 [ 1119.660144][T17435] active_anon 69632 [ 1119.660144][T17435] inactive_file 0 [ 1119.660144][T17435] active_file 0 [ 1119.660144][T17435] unevictable 135168 [ 1119.660144][T17435] slab_reclaimable 135168 [ 1119.660144][T17435] slab_unreclaimable 200704 [ 1119.660144][T17435] pgfault 57420 [ 1119.660144][T17435] pgmajfault 0 [ 1119.660144][T17435] workingset_refault 0 [ 1119.660144][T17435] workingset_activate 0 [ 1119.660144][T17435] workingset_nodereclaim 0 [ 1119.660144][T17435] pgrefill 269 [ 1119.660144][T17435] pgscan 267 [ 1119.660144][T17435] pgsteal 33 [ 1119.660144][T17435] pgactivate 231 [ 1119.755037][T17435] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=17435,uid=0 [ 1119.770602][T17435] Memory cgroup out of memory: Killed process 17435 (syz-executor.1) total-vm:72456kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 [ 1119.789259][ T1063] oom_reaper: reaped process 17435 (syz-executor.1), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 16:39:35 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:39:35 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:39:35 executing program 4: r0 = socket(0x0, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:39:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000004c0)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:39:35 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x06', 0x0, 0x0, 0x0) 16:39:36 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:39:36 executing program 4: r0 = socket(0x0, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:39:36 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:39:36 executing program 0: r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f00000000c0), 0x4) 16:39:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000004c0)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:39:36 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000280008001c000100000000000000000000000000000000000010000002000000080002000000020008000100726564001c01020004010200b205a34f0459cc6abb699f4e08e3b1b5f75780560a59a8480dae55818041c02d8471389f5a076eaa787f8246aef232f41fb4fd095e664069035a011afb427b4799dc17338322cbd91968a88f2fbcbba734486e4d3c392ec5c40433021f006b4ddf02645062bacedcbcd61e4be8eea0e577dae0a23161a078fbdf38770e055341db2eca0ca565e8c92336422a57f6adad6ed581b27ccc9155e93c542353f1681423161cb1e44cc5b75a30515c051d3a8f0d2bcb9e9ebfa6290dd5fd8cd5150410922c3f86a3cee1d9e807ad3428f51c99eb16018bf7a6cd83dca6ff4af8a94fab0a1d86fded7a3835a987bd9f53499def9115ff45ce9d94aa0000000000000000140001000700000000000000000000000000000090755b1181d8ac64ad6e566b7b257541d4d4724304aa7f09742cb7aa1356d8a6ad0ffb6f29159b620809292345aed62b298e22129645d2c2df3a1049bb8561dc4bcf376aa1e40955892f428fef7bf7a683ebf60e73b5375d99d503b76a2eafe39c6e07a7ff905b71f6e41a8be26c62eb3d2530d15a1ab1d9ade93c7871a16f73894c05b9160fb84864e78c5ad2b627edd0d0393f66909ed0110ce53e3466384674a182dc5cf9e641af3ed8ad5f73c2061aef4a4f65c9ae577e81bff9f24354d65f4d1e7a5cf357bf520c903a35d6b21ca60a8728f6c2374d6070950331a750ce506b7fb85105121bba272f13b7e7692a525cf9855f6225739c944d37d257b902533ee7569e5d5df9c4673cdcaafaa26a75d5991552519f4500448ff3c95befb88ae00d"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:39:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000004c0)={0x2, 0x0, @empty}, 0x10) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:39:36 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 16:39:36 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:39:36 executing program 4: r0 = socket(0x11, 0x0, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:39:36 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000280008001c000100000000000000000000000000000000000010000002000000080002000000020008000100726564001c01020004010200b205a34f0459cc6abb699f4e08e3b1b5f75780560a59a8480dae55818041c02d8471389f5a076eaa787f8246aef232f41fb4fd095e664069035a011afb427b4799dc17338322cbd91968a88f2fbcbba734486e4d3c392ec5c40433021f006b4ddf02645062bacedcbcd61e4be8eea0e577dae0a23161a078fbdf38770e055341db2eca0ca565e8c92336422a57f6adad6ed581b27ccc9155e93c542353f1681423161cb1e44cc5b75a30515c051d3a8f0d2bcb9e9ebfa6290dd5fd8cd5150410922c3f86a3cee1d9e807ad3428f51c99eb16018bf7a6cd83dca6ff4af8a94fab0a1d86fded7a3835a987bd9f53499def9115ff45ce9d94aa0000000000000000140001000700000000000000000000000000000090755b1181d8ac64ad6e566b7b257541d4d4724304aa7f09742cb7aa1356d8a6ad0ffb6f29159b620809292345aed62b298e22129645d2c2df3a1049bb8561dc4bcf376aa1e40955892f428fef7bf7a683ebf60e73b5375d99d503b76a2eafe39c6e07a7ff905b71f6e41a8be26c62eb3d2530d15a1ab1d9ade93c7871a16f73894c05b9160fb84864e78c5ad2b627edd0d0393f66909ed0110ce53e3466384674a182dc5cf9e641af3ed8ad5f73c2061aef4a4f65c9ae577e81bff9f24354d65f4d1e7a5cf357bf520c903a35d6b21ca60a8728f6c2374d6070950331a750ce506b7fb85105121bba272f13b7e7692a525cf9855f6225739c944d37d257b902533ee7569e5d5df9c4673cdcaafaa26a75d5991552519f4500448ff3c95befb88ae00d"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:39:36 executing program 4: r0 = socket(0x11, 0x0, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:39:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000004c0)={0x2, 0x0, @empty}, 0x10) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:39:36 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000003c0)=""/179, 0x1a, 0xb3, 0x1}, 0x20) [ 1121.725810][T23226] device bridge_slave_1 left promiscuous mode [ 1121.732146][T23226] bridge0: port 2(bridge_slave_1) entered disabled state [ 1121.785726][T23226] device bridge_slave_0 left promiscuous mode [ 1121.792083][T23226] bridge0: port 1(bridge_slave_0) entered disabled state [ 1122.835413][T23226] device hsr_slave_0 left promiscuous mode [ 1122.904999][T23226] device hsr_slave_1 left promiscuous mode [ 1122.963947][T23226] team0 (unregistering): Port device team_slave_1 removed [ 1122.974768][T23226] team0 (unregistering): Port device team_slave_0 removed [ 1122.985805][T23226] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1123.029098][T23226] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1123.113935][T23226] bond0 (unregistering): Released all slaves [ 1123.233907][T17839] IPVS: ftp: loaded support on port[0] = 21 [ 1123.373776][T17842] IPVS: ftp: loaded support on port[0] = 21 [ 1123.389962][T17839] chnl_net:caif_netlink_parms(): no params data found [ 1123.472817][T17839] bridge0: port 1(bridge_slave_0) entered blocking state [ 1123.483534][T17839] bridge0: port 1(bridge_slave_0) entered disabled state [ 1123.492906][T17839] device bridge_slave_0 entered promiscuous mode [ 1123.507803][T17839] bridge0: port 2(bridge_slave_1) entered blocking state [ 1123.518601][T17839] bridge0: port 2(bridge_slave_1) entered disabled state [ 1123.527841][T17839] device bridge_slave_1 entered promiscuous mode [ 1123.572793][T17839] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1123.592870][T17839] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1123.632876][T17842] chnl_net:caif_netlink_parms(): no params data found [ 1123.669928][T17839] team0: Port device team_slave_0 added [ 1123.682969][T17839] team0: Port device team_slave_1 added [ 1123.701061][T17842] bridge0: port 1(bridge_slave_0) entered blocking state [ 1123.708286][T17842] bridge0: port 1(bridge_slave_0) entered disabled state [ 1123.716967][T17842] device bridge_slave_0 entered promiscuous mode [ 1123.725678][T17842] bridge0: port 2(bridge_slave_1) entered blocking state [ 1123.732815][T17842] bridge0: port 2(bridge_slave_1) entered disabled state [ 1123.741549][T17842] device bridge_slave_1 entered promiscuous mode [ 1123.779918][T17842] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1123.791287][T17842] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1123.838185][T17839] device hsr_slave_0 entered promiscuous mode [ 1123.875450][T17839] device hsr_slave_1 entered promiscuous mode [ 1123.915025][T17839] debugfs: Directory 'hsr0' with parent '/' already present! [ 1123.937877][T17842] team0: Port device team_slave_0 added [ 1123.953515][T17842] team0: Port device team_slave_1 added [ 1123.966208][T17839] bridge0: port 2(bridge_slave_1) entered blocking state [ 1123.973417][T17839] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1123.980802][T17839] bridge0: port 1(bridge_slave_0) entered blocking state [ 1123.988142][T17839] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1124.048343][T17842] device hsr_slave_0 entered promiscuous mode [ 1124.085428][T17842] device hsr_slave_1 entered promiscuous mode [ 1124.155092][T17842] debugfs: Directory 'hsr0' with parent '/' already present! [ 1124.199755][T17839] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1124.207943][T17842] bridge0: port 2(bridge_slave_1) entered blocking state [ 1124.215037][T17842] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1124.222485][T17842] bridge0: port 1(bridge_slave_0) entered blocking state [ 1124.229564][T17842] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1124.250687][T17839] 8021q: adding VLAN 0 to HW filter on device team0 [ 1124.259218][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1124.268766][ T4362] bridge0: port 1(bridge_slave_0) entered disabled state [ 1124.280035][ T4362] bridge0: port 2(bridge_slave_1) entered disabled state [ 1124.295478][ T4362] bridge0: port 1(bridge_slave_0) entered disabled state [ 1124.304336][ T4362] bridge0: port 2(bridge_slave_1) entered disabled state [ 1124.335047][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1124.344061][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1124.353305][ T4362] bridge0: port 1(bridge_slave_0) entered blocking state [ 1124.360492][ T4362] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1124.369801][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1124.378793][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1124.387934][ T4362] bridge0: port 2(bridge_slave_1) entered blocking state [ 1124.395031][ T4362] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1124.421308][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1124.430563][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1124.440236][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1124.449265][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1124.458759][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1124.477483][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1124.492260][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1124.501659][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1124.510833][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1124.529412][T17842] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1124.541382][T17839] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1124.552717][T17839] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1124.565259][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1124.573914][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1124.588737][T17842] 8021q: adding VLAN 0 to HW filter on device team0 [ 1124.597892][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1124.607617][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1124.625620][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1124.634508][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1124.643356][ T4358] bridge0: port 1(bridge_slave_0) entered blocking state [ 1124.650429][ T4358] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1124.669320][T17839] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1124.678385][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1124.688437][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1124.697692][ T4358] bridge0: port 2(bridge_slave_1) entered blocking state [ 1124.704945][ T4358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1124.731898][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1124.741447][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1124.751299][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1124.760993][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1124.770202][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1124.779451][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1124.788673][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1124.797627][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1124.807095][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1124.819873][T17842] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1124.831659][T17842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1124.840509][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1124.851779][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1124.963721][T17842] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1125.137040][T17850] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1125.166553][T17850] CPU: 1 PID: 17850 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1125.174705][T17850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1125.184770][T17850] Call Trace: [ 1125.188219][T17850] dump_stack+0xf5/0x159 [ 1125.192462][T17850] dump_header+0xaa/0x449 [ 1125.196865][T17850] oom_kill_process.cold+0x10/0x15 [ 1125.202136][T17850] out_of_memory+0x231/0xa00 [ 1125.206727][T17850] ? preempt_schedule_common+0x37/0x90 [ 1125.212202][T17850] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1125.217858][T17850] mem_cgroup_out_of_memory+0x128/0x150 [ 1125.223475][T17850] memory_max_write+0x17b/0x250 [ 1125.228405][T17850] cgroup_file_write+0x119/0x320 [ 1125.233365][T17850] ? high_work_func+0x30/0x30 [ 1125.238146][T17850] kernfs_fop_write+0x1f4/0x2e0 [ 1125.243111][T17850] ? cgroup_css.part.0+0x90/0x90 [ 1125.248106][T17850] __vfs_write+0x67/0xc0 [ 1125.252384][T17850] ? kernfs_seq_show+0xe0/0xe0 [ 1125.257273][T17850] vfs_write+0x18a/0x390 [ 1125.261546][T17850] ksys_write+0xd5/0x1b0 [ 1125.265806][T17850] __x64_sys_write+0x4c/0x60 [ 1125.270564][T17850] do_syscall_64+0xcc/0x370 [ 1125.275086][T17850] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1125.280984][T17850] RIP: 0033:0x459f39 [ 1125.285018][T17850] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1125.304796][T17850] RSP: 002b:00007f2f7d191c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1125.313326][T17850] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1125.321397][T17850] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 1125.329376][T17850] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1125.337349][T17850] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7d1926d4 [ 1125.345551][T17850] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1125.356523][T17850] memory: usage 4668kB, limit 0kB, failcnt 802 [ 1125.362971][T17850] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1125.372631][T17850] Memory cgroup stats for /syz3: [ 1125.372936][T17850] anon 4272128 [ 1125.372936][T17850] file 45056 [ 1125.372936][T17850] kernel_stack 36864 [ 1125.372936][T17850] slab 282624 [ 1125.372936][T17850] sock 0 [ 1125.372936][T17850] shmem 0 [ 1125.372936][T17850] file_mapped 0 [ 1125.372936][T17850] file_dirty 135168 [ 1125.372936][T17850] file_writeback 0 [ 1125.372936][T17850] anon_thp 4194304 [ 1125.372936][T17850] inactive_anon 0 [ 1125.372936][T17850] active_anon 4272128 [ 1125.372936][T17850] inactive_file 135168 [ 1125.372936][T17850] active_file 135168 [ 1125.372936][T17850] unevictable 135168 [ 1125.372936][T17850] slab_reclaimable 135168 [ 1125.372936][T17850] slab_unreclaimable 147456 [ 1125.372936][T17850] pgfault 53460 [ 1125.372936][T17850] pgmajfault 0 [ 1125.372936][T17850] workingset_refault 0 [ 1125.372936][T17850] workingset_activate 0 [ 1125.372936][T17850] workingset_nodereclaim 0 [ 1125.372936][T17850] pgrefill 198 [ 1125.372936][T17850] pgscan 198 [ 1125.372936][T17850] pgsteal 0 [ 1125.372936][T17850] pgactivate 198 [ 1125.470982][T17850] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=17849,uid=0 [ 1125.488377][T17850] Memory cgroup out of memory: Killed process 17849 (syz-executor.3) total-vm:72720kB, anon-rss:4196kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:163840kB oom_score_adj:1000 [ 1125.508087][ T1063] oom_reaper: reaped process 17849 (syz-executor.3), now anon-rss:0kB, file-rss:34864kB, shmem-rss:0kB [ 1125.519711][T17861] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1125.550973][T17861] CPU: 1 PID: 17861 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1125.558965][T17861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1125.569086][T17861] Call Trace: [ 1125.572413][T17861] dump_stack+0xf5/0x159 [ 1125.576698][T17861] dump_header+0xaa/0x449 [ 1125.581240][T17861] oom_kill_process.cold+0x10/0x15 [ 1125.586404][T17861] out_of_memory+0x231/0xa00 [ 1125.591025][T17861] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1125.596747][T17861] mem_cgroup_out_of_memory+0x128/0x150 [ 1125.602399][T17861] memory_max_write+0x17b/0x250 [ 1125.607288][T17861] cgroup_file_write+0x119/0x320 [ 1125.612256][T17861] ? high_work_func+0x30/0x30 [ 1125.616976][T17861] kernfs_fop_write+0x1f4/0x2e0 [ 1125.621927][T17861] ? cgroup_css.part.0+0x90/0x90 [ 1125.626980][T17861] __vfs_write+0x67/0xc0 [ 1125.631245][T17861] ? kernfs_seq_show+0xe0/0xe0 [ 1125.636038][T17861] vfs_write+0x18a/0x390 [ 1125.640319][T17861] ksys_write+0xd5/0x1b0 [ 1125.644594][T17861] __x64_sys_write+0x4c/0x60 16:39:41 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:39:41 executing program 4: r0 = socket(0x11, 0x0, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:39:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000003c0)=""/179, 0x1a, 0xb3, 0x1}, 0x20) 16:39:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000004c0)={0x2, 0x0, @empty}, 0x10) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:39:41 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1125.649288][T17861] do_syscall_64+0xcc/0x370 [ 1125.653830][T17861] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1125.659778][T17861] RIP: 0033:0x459f39 [ 1125.663828][T17861] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1125.684232][T17861] RSP: 002b:00007f54b619dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1125.692670][T17861] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1125.700733][T17861] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000b [ 1125.708723][T17861] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 1125.716817][T17861] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f54b619e6d4 [ 1125.724886][T17861] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1125.733946][T17861] memory: usage 4708kB, limit 0kB, failcnt 890 [ 1125.740377][T17861] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1125.747586][T17861] Memory cgroup stats for /syz1: [ 1125.747883][T17861] anon 4317184 [ 1125.747883][T17861] file 65536 [ 1125.747883][T17861] kernel_stack 73728 [ 1125.747883][T17861] slab 335872 [ 1125.747883][T17861] sock 0 [ 1125.747883][T17861] shmem 0 [ 1125.747883][T17861] file_mapped 0 [ 1125.747883][T17861] file_dirty 0 [ 1125.747883][T17861] file_writeback 0 [ 1125.747883][T17861] anon_thp 4194304 [ 1125.747883][T17861] inactive_anon 135168 [ 1125.747883][T17861] active_anon 4317184 [ 1125.747883][T17861] inactive_file 0 [ 1125.747883][T17861] active_file 0 16:39:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) [ 1125.747883][T17861] unevictable 135168 [ 1125.747883][T17861] slab_reclaimable 135168 [ 1125.747883][T17861] slab_unreclaimable 200704 [ 1125.747883][T17861] pgfault 57519 [ 1125.747883][T17861] pgmajfault 0 [ 1125.747883][T17861] workingset_refault 0 [ 1125.747883][T17861] workingset_activate 0 [ 1125.747883][T17861] workingset_nodereclaim 0 [ 1125.747883][T17861] pgrefill 269 [ 1125.747883][T17861] pgscan 267 [ 1125.747883][T17861] pgsteal 33 [ 1125.747883][T17861] pgactivate 231 [ 1125.875050][T17861] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=17857,uid=0 [ 1125.944165][T17861] Memory cgroup out of memory: Killed process 17857 (syz-executor.1) total-vm:72984kB, anon-rss:4256kB, file-rss:35812kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 1126.072955][ T1063] oom_reaper: reaped process 17857 (syz-executor.1), now anon-rss:0kB, file-rss:34864kB, shmem-rss:0kB [ 1126.084276][T17839] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1126.104806][T17839] CPU: 1 PID: 17839 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1126.112795][T17839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1126.122867][T17839] Call Trace: [ 1126.126188][T17839] dump_stack+0xf5/0x159 [ 1126.130531][T17839] dump_header+0xaa/0x449 [ 1126.134909][T17839] oom_kill_process.cold+0x10/0x15 [ 1126.140094][T17839] out_of_memory+0x231/0xa00 [ 1126.144709][T17839] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1126.150384][T17839] mem_cgroup_out_of_memory+0x128/0x150 [ 1126.156017][T17839] try_charge+0xb3a/0xbc0 [ 1126.160429][T17839] ? rcu_note_context_switch+0x700/0x760 [ 1126.166108][T17839] mem_cgroup_try_charge+0xd2/0x260 [ 1126.171549][T17839] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1126.177259][T17839] wp_page_copy+0x322/0x1160 [ 1126.181864][T17839] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1126.187686][T17839] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1126.193355][T17839] do_wp_page+0x192/0x11f0 [ 1126.197770][T17839] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1126.203641][T17839] __handle_mm_fault+0x1c07/0x2cb0 [ 1126.208765][T17839] handle_mm_fault+0x21b/0x530 [ 1126.213534][T17839] __do_page_fault+0x3fb/0x9e0 [ 1126.218309][T17839] do_page_fault+0x54/0x233 [ 1126.222980][T17839] ? prepare_exit_to_usermode+0x154/0x1a0 [ 1126.228712][T17839] page_fault+0x34/0x40 [ 1126.232856][T17839] RIP: 0033:0x431016 [ 1126.236912][T17839] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 cc 5c 64 00 85 c0 0f 84 [ 1126.256738][T17839] RSP: 002b:00007ffd1a4097a0 EFLAGS: 00010206 [ 1126.262797][T17839] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 16:39:42 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r10, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r2, 0x0, 0x0) [ 1126.270818][T17839] RDX: 00000000028e0930 RSI: 00000000028e8970 RDI: 0000000000000003 [ 1126.279028][T17839] RBP: 0000000000008041 R08: 0000000000000001 R09: 00000000028df940 [ 1126.287009][T17839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1126.295256][T17839] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 16:39:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000003c0)=""/179, 0x1a, 0xb3, 0x1}, 0x20) 16:39:42 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:39:42 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1126.331232][T17839] memory: usage 260kB, limit 0kB, failcnt 814 [ 1126.337652][T17839] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1126.345144][T17839] Memory cgroup stats for /syz3: [ 1126.345425][T17839] anon 57344 [ 1126.345425][T17839] file 45056 [ 1126.345425][T17839] kernel_stack 0 [ 1126.345425][T17839] slab 282624 [ 1126.345425][T17839] sock 0 [ 1126.345425][T17839] shmem 0 [ 1126.345425][T17839] file_mapped 0 [ 1126.345425][T17839] file_dirty 135168 [ 1126.345425][T17839] file_writeback 0 [ 1126.345425][T17839] anon_thp 0 [ 1126.345425][T17839] inactive_anon 0 [ 1126.345425][T17839] active_anon 57344 [ 1126.345425][T17839] inactive_file 135168 [ 1126.345425][T17839] active_file 135168 [ 1126.345425][T17839] unevictable 135168 [ 1126.345425][T17839] slab_reclaimable 135168 [ 1126.345425][T17839] slab_unreclaimable 147456 [ 1126.345425][T17839] pgfault 53460 [ 1126.345425][T17839] pgmajfault 0 [ 1126.345425][T17839] workingset_refault 0 [ 1126.345425][T17839] workingset_activate 0 [ 1126.345425][T17839] workingset_nodereclaim 0 [ 1126.345425][T17839] pgrefill 198 [ 1126.345425][T17839] pgscan 198 [ 1126.345425][T17839] pgsteal 0 [ 1126.345425][T17839] pgactivate 198 16:39:42 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32, @ANYBLOB="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"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:39:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000003c0)=""/179, 0x1a, 0xb3, 0x1}, 0x20) [ 1126.583837][T17839] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=17839,uid=0 [ 1126.633251][T17839] Memory cgroup out of memory: Killed process 17839 (syz-executor.3) total-vm:72456kB, anon-rss:76kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 [ 1126.675037][T17842] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1126.704958][T17842] CPU: 1 PID: 17842 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1126.712905][T17842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1126.722974][T17842] Call Trace: [ 1126.726292][T17842] dump_stack+0xf5/0x159 [ 1126.730569][T17842] dump_header+0xaa/0x449 [ 1126.734943][T17842] oom_kill_process.cold+0x10/0x15 [ 1126.740127][T17842] out_of_memory+0x231/0xa00 [ 1126.744741][T17842] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1126.750407][T17842] mem_cgroup_out_of_memory+0x128/0x150 [ 1126.755984][T17842] try_charge+0xb3a/0xbc0 [ 1126.760408][T17842] ? rcu_note_context_switch+0x700/0x760 [ 1126.766106][T17842] mem_cgroup_try_charge+0xd2/0x260 [ 1126.771335][T17842] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1126.777133][T17842] __handle_mm_fault+0x179a/0x2cb0 [ 1126.782363][T17842] handle_mm_fault+0x21b/0x530 [ 1126.787212][T17842] __do_page_fault+0x3fb/0x9e0 [ 1126.792070][T17842] do_page_fault+0x54/0x233 [ 1126.796602][T17842] ? do_syscall_64+0x270/0x370 [ 1126.801461][T17842] page_fault+0x34/0x40 [ 1126.805641][T17842] RIP: 0033:0x403a42 [ 1126.809568][T17842] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 19 8f 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 39 44 05 00 48 [ 1126.829496][T17842] RSP: 002b:00007fff8415dfc0 EFLAGS: 00010246 [ 1126.835585][T17842] RAX: 0000000000000000 RBX: 0000000000112e1d RCX: 00000000004139f0 [ 1126.843573][T17842] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007fff8415f0f0 [ 1126.851622][T17842] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000000001ebc940 [ 1126.859617][T17842] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff8415f0f0 [ 1126.868252][T17842] R13: 00007fff8415f0e0 R14: 0000000000000000 R15: 00007fff8415f0f0 [ 1126.924821][T17842] memory: usage 276kB, limit 0kB, failcnt 898 [ 1126.951824][T17842] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1126.964505][T17842] Memory cgroup stats for /syz1: [ 1126.964742][T17842] anon 45056 [ 1126.964742][T17842] file 65536 [ 1126.964742][T17842] kernel_stack 36864 [ 1126.964742][T17842] slab 335872 [ 1126.964742][T17842] sock 0 [ 1126.964742][T17842] shmem 0 [ 1126.964742][T17842] file_mapped 0 [ 1126.964742][T17842] file_dirty 0 [ 1126.964742][T17842] file_writeback 0 [ 1126.964742][T17842] anon_thp 0 [ 1126.964742][T17842] inactive_anon 135168 [ 1126.964742][T17842] active_anon 45056 [ 1126.964742][T17842] inactive_file 0 [ 1126.964742][T17842] active_file 0 [ 1126.964742][T17842] unevictable 135168 [ 1126.964742][T17842] slab_reclaimable 135168 [ 1126.964742][T17842] slab_unreclaimable 200704 [ 1126.964742][T17842] pgfault 57519 [ 1126.964742][T17842] pgmajfault 0 [ 1126.964742][T17842] workingset_refault 0 [ 1126.964742][T17842] workingset_activate 0 [ 1126.964742][T17842] workingset_nodereclaim 0 [ 1126.964742][T17842] pgrefill 269 [ 1126.964742][T17842] pgscan 267 [ 1126.964742][T17842] pgsteal 33 [ 1126.964742][T17842] pgactivate 231 [ 1127.064391][T17842] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=17842,uid=0 [ 1127.085854][T17842] Memory cgroup out of memory: Killed process 17842 (syz-executor.1) total-vm:72456kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 [ 1127.108804][ T1063] oom_reaper: reaped process 17842 (syz-executor.1), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 16:39:43 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:39:43 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:39:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 16:39:43 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000280008001c000100000000000000000000000000000000000010000002000000080002000000020008000100726564001c01020004010200b205a34f0459cc6abb699f4e08e3b1b5f75780560a59a8480dae55818041c02d8471389f5a076eaa787f8246aef232f41fb4fd095e664069035a011afb427b4799dc17338322cbd91968a88f2fbcbba734486e4d3c392ec5c40433021f006b4ddf02645062bacedcbcd61e4be8eea0e577dae0a23161a078fbdf38770e055341db2eca0ca565e8c92336422a57f6adad6ed581b27ccc9155e93c542353f1681423161cb1e44cc5b75a30515c051d3a8f0d2bcb9e9ebfa6290dd5fd8cd5150410922c3f86a3cee1d9e807ad3428f51c99eb16018bf7a6cd83dca6ff4af8a94fab0a1d86fded7a3835a987bd9f53499def9115ff45ce9d94aa0000000000000000140001000700000000000000000000000000000090755b1181d8ac64ad6e566b7b257541d4d4724304aa7f09742cb7aa1356d8a6ad0ffb6f29159b620809292345aed62b298e22129645d2c2df3a1049bb8561dc4bcf376aa1e40955892f428fef7bf7a683ebf60e73b5375d99d503b76a2eafe39c6e07a7ff905b71f6e41a8be26c62eb3d2530d15a1ab1d9ade93c7871a16f73894c05b9160fb84864e78c5ad2b627edd0d0393f66909ed0110ce53e3466384674a182dc5cf9e641af3ed8ad5f73c2061aef4a4f65c9ae577e81bff9f24354d65f4d1e7a5cf357bf520c903a35d6b21ca60a8728f6c2374d6070950331a750ce506b7fb85105121bba272f13b7e7692a525cf9855f6225739c944d37d257b902533ee7569e5d5df9c4673cdcaafaa26a75d5991552519f4500448ff3c95befb88ae00d"], 0x170}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:39:43 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r0 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) [ 1127.315648][T14662] device bridge_slave_1 left promiscuous mode [ 1127.321993][T14662] bridge0: port 2(bridge_slave_1) entered disabled state 16:39:43 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) [ 1127.405958][T14662] device bridge_slave_0 left promiscuous mode [ 1127.415078][T14662] bridge0: port 1(bridge_slave_0) entered disabled state [ 1128.705309][T14662] device hsr_slave_0 left promiscuous mode [ 1128.755025][T14662] device hsr_slave_1 left promiscuous mode [ 1128.814693][T14662] team0 (unregistering): Port device team_slave_1 removed [ 1128.828082][T14662] team0 (unregistering): Port device team_slave_0 removed [ 1128.838957][T14662] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1128.880574][T14662] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1128.943922][T14662] bond0 (unregistering): Released all slaves 16:39:44 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r10, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r2, 0x0, 0x0) 16:39:44 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:39:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 16:39:44 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r0 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:39:45 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:39:45 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r10, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r2, 0x0, 0x0) 16:39:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 16:39:45 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r0 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:39:45 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0x0, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:39:45 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:39:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) [ 1129.838789][T17927] IPVS: ftp: loaded support on port[0] = 21 [ 1130.190790][T17927] chnl_net:caif_netlink_parms(): no params data found [ 1130.275486][T17927] bridge0: port 1(bridge_slave_0) entered blocking state [ 1130.292850][T17927] bridge0: port 1(bridge_slave_0) entered disabled state [ 1130.313976][T17927] device bridge_slave_0 entered promiscuous mode [ 1130.324106][T17927] bridge0: port 2(bridge_slave_1) entered blocking state [ 1130.343279][T17927] bridge0: port 2(bridge_slave_1) entered disabled state [ 1130.364528][T17927] device bridge_slave_1 entered promiscuous mode [ 1130.413151][T17927] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1130.447042][T17927] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1130.471697][T17927] team0: Port device team_slave_0 added [ 1130.479026][T17927] team0: Port device team_slave_1 added [ 1130.548552][T17927] device hsr_slave_0 entered promiscuous mode [ 1130.585406][T17927] device hsr_slave_1 entered promiscuous mode [ 1130.645379][T17927] debugfs: Directory 'hsr0' with parent '/' already present! [ 1130.662773][T17927] bridge0: port 2(bridge_slave_1) entered blocking state [ 1130.669904][T17927] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1130.677261][T17927] bridge0: port 1(bridge_slave_0) entered blocking state [ 1130.684323][T17927] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1130.725920][T17927] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1130.739653][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1130.748853][ T7243] bridge0: port 1(bridge_slave_0) entered disabled state [ 1130.757696][ T7243] bridge0: port 2(bridge_slave_1) entered disabled state [ 1130.775840][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1130.798779][T17927] 8021q: adding VLAN 0 to HW filter on device team0 [ 1130.810647][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1130.819372][ T4362] bridge0: port 1(bridge_slave_0) entered blocking state [ 1130.826437][ T4362] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1130.848626][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1130.857961][ T2912] bridge0: port 2(bridge_slave_1) entered blocking state [ 1130.865113][ T2912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1130.874967][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1130.894393][T17927] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1130.905436][T17927] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1130.918921][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1130.928296][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1130.937709][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1130.947934][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1130.956639][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1130.977184][T17927] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1131.361517][T17945] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1131.377113][T17945] CPU: 1 PID: 17945 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1131.385026][T17945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1131.395214][T17945] Call Trace: [ 1131.398603][T17945] dump_stack+0xf5/0x159 [ 1131.402996][T17945] dump_header+0xaa/0x449 [ 1131.407416][T17945] oom_kill_process.cold+0x10/0x15 [ 1131.412535][T17945] out_of_memory+0x231/0xa00 [ 1131.417161][T17945] ? preempt_schedule_common+0x37/0x90 [ 1131.422607][T17945] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1131.428334][T17945] mem_cgroup_out_of_memory+0x128/0x150 [ 1131.433891][T17945] memory_max_write+0x17b/0x250 [ 1131.439115][T17945] cgroup_file_write+0x119/0x320 [ 1131.444116][T17945] ? high_work_func+0x30/0x30 [ 1131.448857][T17945] kernfs_fop_write+0x1f4/0x2e0 [ 1131.453701][T17945] ? cgroup_css.part.0+0x90/0x90 [ 1131.458636][T17945] __vfs_write+0x67/0xc0 [ 1131.462875][T17945] ? kernfs_seq_show+0xe0/0xe0 [ 1131.467638][T17945] vfs_write+0x18a/0x390 [ 1131.471929][T17945] ksys_write+0xd5/0x1b0 [ 1131.476184][T17945] __x64_sys_write+0x4c/0x60 [ 1131.480786][T17945] do_syscall_64+0xcc/0x370 [ 1131.485321][T17945] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1131.491212][T17945] RIP: 0033:0x459f39 [ 1131.495163][T17945] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1131.514938][T17945] RSP: 002b:00007fede1937c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1131.523340][T17945] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1131.531307][T17945] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 1131.539441][T17945] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1131.547400][T17945] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fede19386d4 [ 1131.555438][T17945] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1131.565716][T17945] memory: usage 4692kB, limit 0kB, failcnt 823 [ 1131.571945][T17945] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1131.579548][T17945] Memory cgroup stats for /syz3: [ 1131.579703][T17945] anon 4354048 [ 1131.579703][T17945] file 45056 [ 1131.579703][T17945] kernel_stack 36864 [ 1131.579703][T17945] slab 282624 [ 1131.579703][T17945] sock 0 [ 1131.579703][T17945] shmem 0 [ 1131.579703][T17945] file_mapped 0 [ 1131.579703][T17945] file_dirty 135168 [ 1131.579703][T17945] file_writeback 0 [ 1131.579703][T17945] anon_thp 4194304 [ 1131.579703][T17945] inactive_anon 0 [ 1131.579703][T17945] active_anon 4354048 [ 1131.579703][T17945] inactive_file 135168 [ 1131.579703][T17945] active_file 135168 [ 1131.579703][T17945] unevictable 135168 [ 1131.579703][T17945] slab_reclaimable 135168 [ 1131.579703][T17945] slab_unreclaimable 147456 [ 1131.579703][T17945] pgfault 53559 [ 1131.579703][T17945] pgmajfault 0 [ 1131.579703][T17945] workingset_refault 0 [ 1131.579703][T17945] workingset_activate 0 [ 1131.579703][T17945] workingset_nodereclaim 0 [ 1131.579703][T17945] pgrefill 198 [ 1131.579703][T17945] pgscan 198 [ 1131.579703][T17945] pgsteal 0 [ 1131.579703][T17945] pgactivate 198 [ 1131.678733][T17945] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=17941,uid=0 [ 1131.694862][T17945] Memory cgroup out of memory: Killed process 17941 (syz-executor.3) total-vm:72852kB, anon-rss:4244kB, file-rss:35824kB, shmem-rss:0kB, UID:0 pgtables:147456kB oom_score_adj:1000 [ 1131.714577][ T1063] oom_reaper: reaped process 17941 (syz-executor.3), now anon-rss:0kB, file-rss:34864kB, shmem-rss:0kB [ 1131.827858][T17947] IPVS: ftp: loaded support on port[0] = 21 [ 1131.923155][T17947] chnl_net:caif_netlink_parms(): no params data found [ 1132.161742][T17947] bridge0: port 1(bridge_slave_0) entered blocking state [ 1132.169118][T17947] bridge0: port 1(bridge_slave_0) entered disabled state [ 1132.184280][T17947] device bridge_slave_0 entered promiscuous mode 16:39:48 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:39:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={0x0, &(0x7f00000003c0)=""/179, 0x0, 0xb3, 0x1}, 0x20) 16:39:48 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:39:48 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0x0, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:39:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) [ 1132.315460][T17947] bridge0: port 2(bridge_slave_1) entered blocking state [ 1132.322534][T17947] bridge0: port 2(bridge_slave_1) entered disabled state [ 1132.331840][T17947] device bridge_slave_1 entered promiscuous mode [ 1132.349617][T17927] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1132.376695][T17927] CPU: 0 PID: 17927 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1132.384756][T17927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1132.394825][T17927] Call Trace: [ 1132.398179][T17927] dump_stack+0xf5/0x159 [ 1132.402471][T17927] dump_header+0xaa/0x449 [ 1132.406834][T17927] oom_kill_process.cold+0x10/0x15 [ 1132.412054][T17927] out_of_memory+0x231/0xa00 [ 1132.416675][T17927] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1132.422522][T17927] mem_cgroup_out_of_memory+0x128/0x150 [ 1132.428136][T17927] try_charge+0xb3a/0xbc0 [ 1132.432583][T17927] ? rcu_note_context_switch+0x700/0x760 [ 1132.438258][T17927] mem_cgroup_try_charge+0xd2/0x260 [ 1132.443521][T17927] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1132.449229][T17927] __handle_mm_fault+0x179a/0x2cb0 [ 1132.454390][T17927] handle_mm_fault+0x21b/0x530 [ 1132.459181][T17927] __do_page_fault+0x3fb/0x9e0 [ 1132.464039][T17927] do_page_fault+0x54/0x233 [ 1132.468570][T17927] ? do_syscall_64+0x270/0x370 16:39:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={0x0, &(0x7f00000003c0)=""/179, 0x0, 0xb3, 0x1}, 0x20) [ 1132.473617][T17927] page_fault+0x34/0x40 [ 1132.477776][T17927] RIP: 0033:0x403a42 [ 1132.481883][T17927] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 19 8f 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 39 44 05 00 48 [ 1132.501532][T17927] RSP: 002b:00007ffcd5c11f20 EFLAGS: 00010246 [ 1132.507628][T17927] RAX: 0000000000000000 RBX: 0000000000114342 RCX: 00000000004139f0 [ 1132.515676][T17927] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffcd5c13050 [ 1132.523693][T17927] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000000001551940 [ 1132.531688][T17927] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffcd5c13050 [ 1132.539675][T17927] R13: 00007ffcd5c13040 R14: 0000000000000000 R15: 00007ffcd5c13050 [ 1132.557340][T17927] memory: usage 288kB, limit 0kB, failcnt 836 [ 1132.594404][T17927] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1132.610691][T17927] Memory cgroup stats for /syz3: [ 1132.610918][T17927] anon 45056 [ 1132.610918][T17927] file 45056 [ 1132.610918][T17927] kernel_stack 36864 [ 1132.610918][T17927] slab 282624 [ 1132.610918][T17927] sock 0 [ 1132.610918][T17927] shmem 0 [ 1132.610918][T17927] file_mapped 0 [ 1132.610918][T17927] file_dirty 135168 [ 1132.610918][T17927] file_writeback 0 [ 1132.610918][T17927] anon_thp 0 [ 1132.610918][T17927] inactive_anon 0 [ 1132.610918][T17927] active_anon 49152 [ 1132.610918][T17927] inactive_file 135168 [ 1132.610918][T17927] active_file 135168 [ 1132.610918][T17927] unevictable 135168 [ 1132.610918][T17927] slab_reclaimable 135168 [ 1132.610918][T17927] slab_unreclaimable 147456 [ 1132.610918][T17927] pgfault 53559 [ 1132.610918][T17927] pgmajfault 0 [ 1132.610918][T17927] workingset_refault 0 [ 1132.610918][T17927] workingset_activate 0 [ 1132.610918][T17927] workingset_nodereclaim 0 [ 1132.610918][T17927] pgrefill 198 [ 1132.610918][T17927] pgscan 198 [ 1132.610918][T17927] pgsteal 0 [ 1132.610918][T17927] pgactivate 198 [ 1132.721060][T17927] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=17927,uid=0 [ 1132.736943][T17927] Memory cgroup out of memory: Killed process 17927 (syz-executor.3) total-vm:72456kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 [ 1132.788947][ T1063] oom_reaper: reaped process 17927 (syz-executor.3), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 1132.814517][T17947] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1132.850122][T17947] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1133.013872][T17947] team0: Port device team_slave_0 added [ 1133.092736][T17947] team0: Port device team_slave_1 added [ 1133.248164][T17947] device hsr_slave_0 entered promiscuous mode [ 1133.295514][T17947] device hsr_slave_1 entered promiscuous mode [ 1133.335005][T17947] debugfs: Directory 'hsr0' with parent '/' already present! [ 1133.440731][T17947] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1133.512502][T17947] 8021q: adding VLAN 0 to HW filter on device team0 [ 1133.520464][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1133.528828][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1133.539737][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1133.548824][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1133.557422][ T2912] bridge0: port 1(bridge_slave_0) entered blocking state [ 1133.564446][ T2912] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1133.630289][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1133.645446][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1133.654282][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1133.663427][ T3501] bridge0: port 2(bridge_slave_1) entered blocking state [ 1133.674761][ T3501] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1133.682710][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1133.692125][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1133.763290][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1133.772051][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1133.782143][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1133.792118][T14662] device bridge_slave_1 left promiscuous mode [ 1133.798681][T14662] bridge0: port 2(bridge_slave_1) entered disabled state [ 1133.855671][T14662] device bridge_slave_0 left promiscuous mode [ 1133.861842][T14662] bridge0: port 1(bridge_slave_0) entered disabled state [ 1133.916450][T14662] device bridge_slave_1 left promiscuous mode [ 1133.922662][T14662] bridge0: port 2(bridge_slave_1) entered disabled state [ 1133.975669][T14662] device bridge_slave_0 left promiscuous mode [ 1133.981861][T14662] bridge0: port 1(bridge_slave_0) entered disabled state [ 1135.555216][T14662] device hsr_slave_0 left promiscuous mode [ 1135.605138][T14662] device hsr_slave_1 left promiscuous mode [ 1135.662800][T14662] team0 (unregistering): Port device team_slave_1 removed [ 1135.675378][T14662] team0 (unregistering): Port device team_slave_0 removed [ 1135.686549][T14662] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1135.739171][T14662] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1135.821689][T14662] bond0 (unregistering): Released all slaves [ 1135.965568][T14662] device hsr_slave_0 left promiscuous mode [ 1136.005163][T14662] device hsr_slave_1 left promiscuous mode [ 1136.052677][T14662] team0 (unregistering): Port device team_slave_1 removed [ 1136.065622][T14662] team0 (unregistering): Port device team_slave_0 removed [ 1136.076651][T14662] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1136.130779][T14662] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1136.194159][T14662] bond0 (unregistering): Released all slaves [ 1136.298077][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1136.307059][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1136.316301][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1136.324646][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1136.333512][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1136.342387][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1136.353092][T17947] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1136.375218][T17947] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1136.740511][T17973] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1136.781198][T17973] CPU: 1 PID: 17973 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1136.789153][T17973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1136.799909][T17973] Call Trace: [ 1136.804323][T17973] dump_stack+0xf5/0x159 [ 1136.808599][T17973] dump_header+0xaa/0x449 [ 1136.812966][T17973] oom_kill_process.cold+0x10/0x15 [ 1136.818122][T17973] out_of_memory+0x231/0xa00 [ 1136.822797][T17973] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1136.828490][T17973] mem_cgroup_out_of_memory+0x128/0x150 [ 1136.834097][T17973] memory_max_write+0x17b/0x250 [ 1136.839034][T17973] cgroup_file_write+0x119/0x320 [ 1136.843987][T17973] ? high_work_func+0x30/0x30 [ 1136.848767][T17973] kernfs_fop_write+0x1f4/0x2e0 [ 1136.853649][T17973] ? cgroup_css.part.0+0x90/0x90 [ 1136.858721][T17973] __vfs_write+0x67/0xc0 [ 1136.863067][T17973] ? kernfs_seq_show+0xe0/0xe0 [ 1136.867904][T17973] vfs_write+0x18a/0x390 [ 1136.872170][T17973] ksys_write+0xd5/0x1b0 [ 1136.876511][T17973] __x64_sys_write+0x4c/0x60 [ 1136.881121][T17973] do_syscall_64+0xcc/0x370 [ 1136.885734][T17973] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1136.891687][T17973] RIP: 0033:0x459f39 [ 1136.895635][T17973] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1136.915341][T17973] RSP: 002b:00007fcce0e31c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1136.923776][T17973] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1136.931761][T17973] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000b [ 1136.939738][T17973] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1136.947722][T17973] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcce0e326d4 [ 1136.955763][T17973] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1136.966277][T17973] memory: usage 4672kB, limit 0kB, failcnt 907 [ 1136.972608][T17973] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1136.980002][T17973] Memory cgroup stats for /syz1: [ 1136.980272][T17973] anon 4329472 [ 1136.980272][T17973] file 65536 [ 1136.980272][T17973] kernel_stack 36864 [ 1136.980272][T17973] slab 196608 [ 1136.980272][T17973] sock 0 [ 1136.980272][T17973] shmem 0 [ 1136.980272][T17973] file_mapped 0 [ 1136.980272][T17973] file_dirty 0 [ 1136.980272][T17973] file_writeback 0 [ 1136.980272][T17973] anon_thp 4194304 [ 1136.980272][T17973] inactive_anon 135168 [ 1136.980272][T17973] active_anon 4329472 [ 1136.980272][T17973] inactive_file 0 [ 1136.980272][T17973] active_file 0 [ 1136.980272][T17973] unevictable 135168 [ 1136.980272][T17973] slab_reclaimable 135168 [ 1136.980272][T17973] slab_unreclaimable 61440 [ 1136.980272][T17973] pgfault 57585 [ 1136.980272][T17973] pgmajfault 0 [ 1136.980272][T17973] workingset_refault 0 [ 1136.980272][T17973] workingset_activate 0 [ 1136.980272][T17973] workingset_nodereclaim 0 [ 1136.980272][T17973] pgrefill 269 [ 1136.980272][T17973] pgscan 267 [ 1136.980272][T17973] pgsteal 33 [ 1136.980272][T17973] pgactivate 231 [ 1137.076700][T17973] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=17970,uid=0 [ 1137.092874][T17973] Memory cgroup out of memory: Killed process 17970 (syz-executor.1) total-vm:72852kB, anon-rss:4192kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 1137.144608][ T1063] oom_reaper: reaped process 17970 (syz-executor.1), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB 16:39:53 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r10, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r2, 0x0, 0x0) 16:39:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:39:53 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0x0, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:39:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={0x0, &(0x7f00000003c0)=""/179, 0x0, 0xb3, 0x1}, 0x20) 16:39:53 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:39:53 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) [ 1137.511192][T17947] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1137.544980][T17947] CPU: 1 PID: 17947 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1137.552943][T17947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1137.563006][T17947] Call Trace: [ 1137.566332][T17947] dump_stack+0xf5/0x159 [ 1137.570625][T17947] dump_header+0xaa/0x449 [ 1137.574983][T17947] oom_kill_process.cold+0x10/0x15 [ 1137.580142][T17947] out_of_memory+0x231/0xa00 [ 1137.584924][T17947] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1137.590617][T17947] mem_cgroup_out_of_memory+0x128/0x150 [ 1137.596260][T17947] try_charge+0xb3a/0xbc0 [ 1137.600623][T17947] ? rcu_note_context_switch+0x700/0x760 [ 1137.606297][T17947] mem_cgroup_try_charge+0xd2/0x260 [ 1137.612186][T17947] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1137.618371][T17947] wp_page_copy+0x322/0x1160 [ 1137.622993][T17947] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1137.628652][T17947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1137.634924][T17947] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1137.640606][T17947] do_wp_page+0x192/0x11f0 [ 1137.645435][T17947] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1137.652044][T17947] __handle_mm_fault+0x1c07/0x2cb0 [ 1137.657188][T17947] handle_mm_fault+0x21b/0x530 [ 1137.662000][T17947] __do_page_fault+0x3fb/0x9e0 [ 1137.666790][T17947] do_page_fault+0x54/0x233 [ 1137.671323][T17947] ? do_syscall_64+0x270/0x370 [ 1137.676156][T17947] page_fault+0x34/0x40 [ 1137.680317][T17947] RIP: 0033:0x403a42 [ 1137.684391][T17947] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 19 8f 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 39 44 05 00 48 [ 1137.704112][T17947] RSP: 002b:00007ffd012b7de0 EFLAGS: 00010246 [ 1137.710196][T17947] RAX: 0000000000000000 RBX: 0000000000115847 RCX: 00000000004139f0 [ 1137.718196][T17947] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffd012b8f10 [ 1137.726191][T17947] RBP: 0000000000000002 R08: 0000000000000001 R09: 000000000137a940 [ 1137.734204][T17947] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffd012b8f10 [ 1137.742890][T17947] R13: 00007ffd012b8f00 R14: 0000000000000000 R15: 00007ffd012b8f10 16:39:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) [ 1137.766582][T17947] memory: usage 268kB, limit 0kB, failcnt 920 [ 1137.773456][T17947] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1137.781079][T17947] Memory cgroup stats for /syz1: [ 1137.781451][T17947] anon 143360 [ 1137.781451][T17947] file 65536 [ 1137.781451][T17947] kernel_stack 36864 [ 1137.781451][T17947] slab 196608 [ 1137.781451][T17947] sock 0 [ 1137.781451][T17947] shmem 0 [ 1137.781451][T17947] file_mapped 0 [ 1137.781451][T17947] file_dirty 0 [ 1137.781451][T17947] file_writeback 0 [ 1137.781451][T17947] anon_thp 0 [ 1137.781451][T17947] inactive_anon 135168 [ 1137.781451][T17947] active_anon 118784 [ 1137.781451][T17947] inactive_file 0 [ 1137.781451][T17947] active_file 0 [ 1137.781451][T17947] unevictable 135168 [ 1137.781451][T17947] slab_reclaimable 135168 [ 1137.781451][T17947] slab_unreclaimable 61440 [ 1137.781451][T17947] pgfault 57585 [ 1137.781451][T17947] pgmajfault 0 [ 1137.781451][T17947] workingset_refault 0 [ 1137.781451][T17947] workingset_activate 0 [ 1137.781451][T17947] workingset_nodereclaim 0 16:39:53 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1137.781451][T17947] pgrefill 269 [ 1137.781451][T17947] pgscan 267 [ 1137.781451][T17947] pgsteal 33 [ 1137.781451][T17947] pgactivate 231 [ 1137.915006][T17947] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=17947,uid=0 16:39:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 16:39:54 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, 0x0, 0x0) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:39:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) [ 1138.255087][T17947] Memory cgroup out of memory: Killed process 17947 (syz-executor.1) total-vm:72456kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 16:39:54 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1138.312259][ T1063] oom_reaper: reaped process 17947 (syz-executor.1), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 16:39:54 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r10, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r2, 0x0, 0x0) 16:39:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 16:39:54 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, 0x0, 0x0) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:39:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:39:54 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1140.446823][T18119] IPVS: ftp: loaded support on port[0] = 21 [ 1140.564652][T18119] chnl_net:caif_netlink_parms(): no params data found [ 1140.574183][T14662] device bridge_slave_1 left promiscuous mode [ 1140.583370][T14662] bridge0: port 2(bridge_slave_1) entered disabled state [ 1140.615900][T14662] device bridge_slave_0 left promiscuous mode [ 1140.622749][T14662] bridge0: port 1(bridge_slave_0) entered disabled state [ 1140.666922][T14662] device bridge_slave_1 left promiscuous mode [ 1140.673174][T14662] bridge0: port 2(bridge_slave_1) entered disabled state [ 1140.735812][T14662] device bridge_slave_0 left promiscuous mode [ 1140.742946][T14662] bridge0: port 1(bridge_slave_0) entered disabled state [ 1142.225172][T14662] device hsr_slave_0 left promiscuous mode [ 1142.315230][T14662] device hsr_slave_1 left promiscuous mode [ 1142.383657][T14662] team0 (unregistering): Port device team_slave_1 removed [ 1142.394623][T14662] team0 (unregistering): Port device team_slave_0 removed [ 1142.405563][T14662] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1142.450320][T14662] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1142.572121][T14662] bond0 (unregistering): Released all slaves [ 1142.715155][T14662] device hsr_slave_0 left promiscuous mode [ 1142.765128][T14662] device hsr_slave_1 left promiscuous mode [ 1142.833919][T14662] team0 (unregistering): Port device team_slave_1 removed [ 1142.845079][T14662] team0 (unregistering): Port device team_slave_0 removed [ 1142.855874][T14662] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1142.910117][T14662] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1142.972634][T14662] bond0 (unregistering): Released all slaves [ 1143.110010][T18119] bridge0: port 1(bridge_slave_0) entered blocking state [ 1143.117494][T18119] bridge0: port 1(bridge_slave_0) entered disabled state [ 1143.125676][T18119] device bridge_slave_0 entered promiscuous mode [ 1143.133407][T18119] bridge0: port 2(bridge_slave_1) entered blocking state [ 1143.140780][T18119] bridge0: port 2(bridge_slave_1) entered disabled state [ 1143.148851][T18119] device bridge_slave_1 entered promiscuous mode [ 1143.169854][T18119] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1143.181397][T18119] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1143.202849][T18119] team0: Port device team_slave_0 added [ 1143.210144][T18119] team0: Port device team_slave_1 added [ 1143.268049][T18119] device hsr_slave_0 entered promiscuous mode [ 1143.305359][T18119] device hsr_slave_1 entered promiscuous mode [ 1143.345515][T18119] debugfs: Directory 'hsr0' with parent '/' already present! [ 1143.432837][T18119] bridge0: port 2(bridge_slave_1) entered blocking state [ 1143.441110][T18119] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1143.448560][T18119] bridge0: port 1(bridge_slave_0) entered blocking state [ 1143.455645][T18119] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1143.499563][T18119] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1143.513139][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1143.523130][ T3501] bridge0: port 1(bridge_slave_0) entered disabled state [ 1143.532281][ T3501] bridge0: port 2(bridge_slave_1) entered disabled state [ 1143.542473][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1143.557176][T18119] 8021q: adding VLAN 0 to HW filter on device team0 [ 1143.569971][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1143.579374][ T3501] bridge0: port 1(bridge_slave_0) entered blocking state [ 1143.586444][ T3501] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1143.606395][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1143.615840][ T4358] bridge0: port 2(bridge_slave_1) entered blocking state [ 1143.622894][ T4358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1143.649342][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1143.658874][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1143.668598][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1143.682897][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1143.693692][T18119] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1143.706561][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1143.743426][T18119] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1144.237601][T18129] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1144.248236][T18129] CPU: 0 PID: 18129 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1144.256217][T18129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1144.267258][T18129] Call Trace: [ 1144.270582][T18129] dump_stack+0xf5/0x159 [ 1144.274890][T18129] dump_header+0xaa/0x449 [ 1144.279277][T18129] oom_kill_process.cold+0x10/0x15 [ 1144.284453][T18129] out_of_memory+0x231/0xa00 [ 1144.289062][T18129] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1144.294768][T18129] mem_cgroup_out_of_memory+0x128/0x150 [ 1144.300417][T18129] memory_max_write+0x17b/0x250 [ 1144.305328][T18129] cgroup_file_write+0x119/0x320 [ 1144.310361][T18129] ? high_work_func+0x30/0x30 [ 1144.315089][T18129] kernfs_fop_write+0x1f4/0x2e0 [ 1144.320030][T18129] ? cgroup_css.part.0+0x90/0x90 [ 1144.325009][T18129] __vfs_write+0x67/0xc0 [ 1144.329338][T18129] ? kernfs_seq_show+0xe0/0xe0 [ 1144.334124][T18129] vfs_write+0x18a/0x390 [ 1144.338393][T18129] ksys_write+0xd5/0x1b0 [ 1144.342727][T18129] __x64_sys_write+0x4c/0x60 [ 1144.347341][T18129] do_syscall_64+0xcc/0x370 [ 1144.351991][T18129] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1144.357901][T18129] RIP: 0033:0x459f39 [ 1144.361853][T18129] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1144.381486][T18129] RSP: 002b:00007f158cd7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1144.389921][T18129] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1144.397921][T18129] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000b [ 1144.405903][T18129] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1144.413961][T18129] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f158cd7b6d4 [ 1144.421943][T18129] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1144.432932][T18129] memory: usage 4704kB, limit 0kB, failcnt 845 [ 1144.439281][T18129] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1144.448599][T18129] Memory cgroup stats for /syz3: [ 1144.448898][T18129] anon 4325376 [ 1144.448898][T18129] file 45056 [ 1144.448898][T18129] kernel_stack 36864 [ 1144.448898][T18129] slab 282624 [ 1144.448898][T18129] sock 0 [ 1144.448898][T18129] shmem 0 [ 1144.448898][T18129] file_mapped 0 [ 1144.448898][T18129] file_dirty 135168 [ 1144.448898][T18129] file_writeback 0 [ 1144.448898][T18129] anon_thp 4194304 [ 1144.448898][T18129] inactive_anon 0 [ 1144.448898][T18129] active_anon 4329472 [ 1144.448898][T18129] inactive_file 135168 [ 1144.448898][T18129] active_file 135168 [ 1144.448898][T18129] unevictable 135168 [ 1144.448898][T18129] slab_reclaimable 135168 [ 1144.448898][T18129] slab_unreclaimable 147456 [ 1144.448898][T18129] pgfault 53658 [ 1144.448898][T18129] pgmajfault 0 [ 1144.448898][T18129] workingset_refault 0 [ 1144.448898][T18129] workingset_activate 0 [ 1144.448898][T18129] workingset_nodereclaim 0 [ 1144.448898][T18129] pgrefill 198 [ 1144.448898][T18129] pgscan 198 [ 1144.448898][T18129] pgsteal 0 [ 1144.448898][T18129] pgactivate 198 [ 1144.546890][T18129] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=18126,uid=0 [ 1144.562443][T18129] Memory cgroup out of memory: Killed process 18126 (syz-executor.3) total-vm:72852kB, anon-rss:4248kB, file-rss:35824kB, shmem-rss:0kB, UID:0 pgtables:151552kB oom_score_adj:1000 [ 1144.583121][ T1063] oom_reaper: reaped process 18126 (syz-executor.3), now anon-rss:0kB, file-rss:34864kB, shmem-rss:0kB 16:40:01 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:40:01 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r10, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r2, 0x0, 0x0) 16:40:01 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, 0x0, 0x0) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:40:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 16:40:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, 0x0, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:40:01 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1145.192091][T18119] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1145.241808][T18119] CPU: 0 PID: 18119 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1145.249761][T18119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1145.259846][T18119] Call Trace: [ 1145.263201][T18119] dump_stack+0xf5/0x159 [ 1145.267505][T18119] dump_header+0xaa/0x449 [ 1145.271876][T18119] oom_kill_process.cold+0x10/0x15 [ 1145.277035][T18119] out_of_memory+0x231/0xa00 [ 1145.281671][T18119] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1145.287431][T18119] mem_cgroup_out_of_memory+0x128/0x150 [ 1145.293074][T18119] try_charge+0xb3a/0xbc0 [ 1145.297449][T18119] ? rcu_note_context_switch+0x700/0x760 [ 1145.303148][T18119] mem_cgroup_try_charge+0xd2/0x260 [ 1145.308384][T18119] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1145.314057][T18119] wp_page_copy+0x322/0x1160 [ 1145.318756][T18119] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1145.324494][T18119] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1145.330192][T18119] do_wp_page+0x192/0x11f0 [ 1145.334646][T18119] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1145.340321][T18119] __handle_mm_fault+0x1c07/0x2cb0 [ 1145.345530][T18119] handle_mm_fault+0x21b/0x530 [ 1145.350365][T18119] __do_page_fault+0x3fb/0x9e0 [ 1145.355227][T18119] do_page_fault+0x54/0x233 [ 1145.359842][T18119] ? prepare_exit_to_usermode+0x154/0x1a0 [ 1145.365665][T18119] page_fault+0x34/0x40 [ 1145.369837][T18119] RIP: 0033:0x431016 [ 1145.373786][T18119] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 cc 5c 64 00 85 c0 0f 84 [ 1145.393628][T18119] RSP: 002b:00007ffeaa83c470 EFLAGS: 00010206 [ 1145.399833][T18119] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1145.407904][T18119] RDX: 00000000018f7930 RSI: 00000000018ff970 RDI: 0000000000000003 [ 1145.415920][T18119] RBP: 0000000000008041 R08: 0000000000000001 R09: 00000000018f6940 [ 1145.423982][T18119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1145.432016][T18119] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 16:40:01 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0), 0x0) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:40:01 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1145.518865][T18119] memory: usage 284kB, limit 0kB, failcnt 862 [ 1145.525112][T18119] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1145.532256][T18119] Memory cgroup stats for /syz3: [ 1145.532489][T18119] anon 131072 [ 1145.532489][T18119] file 45056 [ 1145.532489][T18119] kernel_stack 36864 [ 1145.532489][T18119] slab 282624 [ 1145.532489][T18119] sock 0 [ 1145.532489][T18119] shmem 0 [ 1145.532489][T18119] file_mapped 0 [ 1145.532489][T18119] file_dirty 135168 [ 1145.532489][T18119] file_writeback 0 [ 1145.532489][T18119] anon_thp 0 [ 1145.532489][T18119] inactive_anon 0 [ 1145.532489][T18119] active_anon 135168 [ 1145.532489][T18119] inactive_file 135168 [ 1145.532489][T18119] active_file 135168 [ 1145.532489][T18119] unevictable 135168 [ 1145.532489][T18119] slab_reclaimable 135168 [ 1145.532489][T18119] slab_unreclaimable 147456 [ 1145.532489][T18119] pgfault 53658 [ 1145.532489][T18119] pgmajfault 0 [ 1145.532489][T18119] workingset_refault 0 [ 1145.532489][T18119] workingset_activate 0 [ 1145.532489][T18119] workingset_nodereclaim 0 [ 1145.532489][T18119] pgrefill 198 [ 1145.532489][T18119] pgscan 198 [ 1145.532489][T18119] pgsteal 0 [ 1145.532489][T18119] pgactivate 198 [ 1145.649106][T18119] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=18119,uid=0 16:40:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, 0x0, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) [ 1145.708972][T18119] Memory cgroup out of memory: Killed process 18119 (syz-executor.3) total-vm:72456kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 16:40:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000003c0)=""/179, 0x1a, 0xb3}, 0x20) 16:40:01 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4], 0x2}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:40:01 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0), 0x0) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0b01000408000000000000000000000000000000000000000800000000000000bb1153e6af9cd7b1ef65fac3b3cd6cd20a1f269ccf05c41692a6709b20dfa865407fde32a87a282c299f70e0bd50cb4809000000d0f3970729929dd758d941915b47c2a9b73e8e70be31d660c625ae235530ccd390b9a0a333cf2ef7330be96ab7e6db31afb0b44ced47bc6a91f8dc81c601000000000000007484b2724c4f472e0357f9fa7deddfb628e52a1b3ec279b2382305931d830c3c0027b5c47858fb16a20989c5bb0821bb7ef7a8cb6d2efe331705bb1d227376e06ac6cad52d2c30b173f738d65ca7cc9f890186d8701b975c9cb30e545b311628ee22b2c799bc3fb9c79f681f119d39f4cd37c3500c694ccf0000000000009029bb1618801b3f3c000000004e8e8bc665a987f44bf6a7f0728b662a05cca657aa6382b8fcc6672c550f660c5c371bd836b4042ea3d4def643a5ab3f17cd0000000000000000000000000000000000000000000000000000000000e6cc9c00000000000000000000000000001300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bf19e066d12850f00bda2ab100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ea0b37f52ec4ed91870f4b8940a9bddbe941420c855f3fbe63a05250fd13ec07c327c47cba0303f426054d157cee8387a44b9d278ff41713d4d8987c953aa6ded91b7bd6d6a393"], 0x51b) 16:40:02 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) [ 1147.345817][T14660] device bridge_slave_1 left promiscuous mode [ 1147.352118][T14660] bridge0: port 2(bridge_slave_1) entered disabled state [ 1147.415810][T14660] device bridge_slave_0 left promiscuous mode [ 1147.422065][T14660] bridge0: port 1(bridge_slave_0) entered disabled state [ 1148.255280][T14660] device hsr_slave_0 left promiscuous mode [ 1148.335111][T14660] device hsr_slave_1 left promiscuous mode [ 1148.412923][T14660] team0 (unregistering): Port device team_slave_1 removed [ 1148.424163][T14660] team0 (unregistering): Port device team_slave_0 removed [ 1148.435105][T14660] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1148.499758][T14660] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1148.561604][T14660] bond0 (unregistering): Released all slaves [ 1148.652887][T18265] IPVS: ftp: loaded support on port[0] = 21 [ 1148.718012][T18265] chnl_net:caif_netlink_parms(): no params data found [ 1148.751499][T18265] bridge0: port 1(bridge_slave_0) entered blocking state [ 1148.758893][T18265] bridge0: port 1(bridge_slave_0) entered disabled state [ 1148.767080][T18265] device bridge_slave_0 entered promiscuous mode [ 1148.774555][T18265] bridge0: port 2(bridge_slave_1) entered blocking state [ 1148.781824][T18265] bridge0: port 2(bridge_slave_1) entered disabled state [ 1148.789623][T18265] device bridge_slave_1 entered promiscuous mode [ 1148.877697][T18265] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1148.892402][T18265] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1148.919828][T18265] team0: Port device team_slave_0 added [ 1148.927125][T18265] team0: Port device team_slave_1 added [ 1148.991696][T18265] device hsr_slave_0 entered promiscuous mode [ 1149.079201][T18265] device hsr_slave_1 entered promiscuous mode [ 1149.124993][T18265] debugfs: Directory 'hsr0' with parent '/' already present! [ 1149.146037][T18265] bridge0: port 2(bridge_slave_1) entered blocking state [ 1149.153125][T18265] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1149.160496][T18265] bridge0: port 1(bridge_slave_0) entered blocking state [ 1149.167575][T18265] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1149.210749][T18265] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1149.226354][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1149.239728][ T2912] bridge0: port 1(bridge_slave_0) entered disabled state [ 1149.249067][ T2912] bridge0: port 2(bridge_slave_1) entered disabled state [ 1149.269728][T18265] 8021q: adding VLAN 0 to HW filter on device team0 [ 1149.285710][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1149.299225][ T2912] bridge0: port 1(bridge_slave_0) entered blocking state [ 1149.306362][ T2912] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1149.329660][ T4363] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1149.342552][ T4363] bridge0: port 2(bridge_slave_1) entered blocking state [ 1149.349677][ T4363] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1149.382285][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1149.391993][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1149.407236][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1149.419548][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1149.430486][T18265] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1149.442580][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1149.460472][T18265] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1149.840417][T18275] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1149.855667][T18275] CPU: 0 PID: 18275 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1149.863594][T18275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1149.873664][T18275] Call Trace: [ 1149.876987][T18275] dump_stack+0xf5/0x159 [ 1149.881266][T18275] dump_header+0xaa/0x449 [ 1149.885706][T18275] oom_kill_process.cold+0x10/0x15 [ 1149.890919][T18275] out_of_memory+0x231/0xa00 [ 1149.895530][T18275] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1149.901181][T18275] mem_cgroup_out_of_memory+0x128/0x150 [ 1149.906737][T18275] memory_max_write+0x17b/0x250 [ 1149.911635][T18275] cgroup_file_write+0x119/0x320 [ 1149.916600][T18275] ? high_work_func+0x30/0x30 [ 1149.921312][T18275] kernfs_fop_write+0x1f4/0x2e0 [ 1149.926155][T18275] ? cgroup_css.part.0+0x90/0x90 [ 1149.931084][T18275] __vfs_write+0x67/0xc0 [ 1149.935327][T18275] ? kernfs_seq_show+0xe0/0xe0 [ 1149.940124][T18275] vfs_write+0x18a/0x390 [ 1149.944539][T18275] ksys_write+0xd5/0x1b0 [ 1149.948776][T18275] __x64_sys_write+0x4c/0x60 [ 1149.953389][T18275] do_syscall_64+0xcc/0x370 [ 1149.957931][T18275] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1149.963810][T18275] RIP: 0033:0x459f39 [ 1149.967723][T18275] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1149.987381][T18275] RSP: 002b:00007f19cebf0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1149.995814][T18275] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1150.003771][T18275] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 1150.011800][T18275] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1150.019761][T18275] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f19cebf16d4 [ 1150.027721][T18275] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1150.036837][T18275] memory: usage 4684kB, limit 0kB, failcnt 929 [ 1150.043036][T18275] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1150.050231][T18275] Memory cgroup stats for /syz1: [ 1150.050514][T18275] anon 4407296 [ 1150.050514][T18275] file 65536 [ 1150.050514][T18275] kernel_stack 36864 [ 1150.050514][T18275] slab 196608 [ 1150.050514][T18275] sock 0 [ 1150.050514][T18275] shmem 0 [ 1150.050514][T18275] file_mapped 0 [ 1150.050514][T18275] file_dirty 0 [ 1150.050514][T18275] file_writeback 0 [ 1150.050514][T18275] anon_thp 4194304 [ 1150.050514][T18275] inactive_anon 135168 [ 1150.050514][T18275] active_anon 4407296 [ 1150.050514][T18275] inactive_file 0 [ 1150.050514][T18275] active_file 0 [ 1150.050514][T18275] unevictable 135168 [ 1150.050514][T18275] slab_reclaimable 135168 [ 1150.050514][T18275] slab_unreclaimable 61440 [ 1150.050514][T18275] pgfault 57651 [ 1150.050514][T18275] pgmajfault 0 [ 1150.050514][T18275] workingset_refault 0 [ 1150.050514][T18275] workingset_activate 0 [ 1150.050514][T18275] workingset_nodereclaim 0 [ 1150.050514][T18275] pgrefill 269 [ 1150.050514][T18275] pgscan 267 [ 1150.050514][T18275] pgsteal 33 [ 1150.050514][T18275] pgactivate 231 [ 1150.146629][T18275] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=18272,uid=0 [ 1150.162332][T18275] Memory cgroup out of memory: Killed process 18272 (syz-executor.1) total-vm:72852kB, anon-rss:4192kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:151552kB oom_score_adj:1000 [ 1150.191470][ T1063] oom_reaper: reaped process 18272 (syz-executor.1), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB 16:40:06 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:40:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000003c0)=""/179, 0x1a, 0xb3}, 0x20) 16:40:06 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4], 0x2}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:40:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, 0x0, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:40:06 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0), 0x0) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0b01000408000000000000000000000000000000000000000800000000000000bb1153e6af9cd7b1ef65fac3b3cd6cd20a1f269ccf05c41692a6709b20dfa865407fde32a87a282c299f70e0bd50cb4809000000d0f3970729929dd758d941915b47c2a9b73e8e70be31d660c625ae235530ccd390b9a0a333cf2ef7330be96ab7e6db31afb0b44ced47bc6a91f8dc81c601000000000000007484b2724c4f472e0357f9fa7deddfb628e52a1b3ec279b2382305931d830c3c0027b5c47858fb16a20989c5bb0821bb7ef7a8cb6d2efe331705bb1d227376e06ac6cad52d2c30b173f738d65ca7cc9f890186d8701b975c9cb30e545b311628ee22b2c799bc3fb9c79f681f119d39f4cd37c3500c694ccf0000000000009029bb1618801b3f3c000000004e8e8bc665a987f44bf6a7f0728b662a05cca657aa6382b8fcc6672c550f660c5c371bd836b4042ea3d4def643a5ab3f17cd0000000000000000000000000000000000000000000000000000000000e6cc9c00000000000000000000000000001300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bf19e066d12850f00bda2ab100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ea0b37f52ec4ed91870f4b8940a9bddbe941420c855f3fbe63a05250fd13ec07c327c47cba0303f426054d157cee8387a44b9d278ff41713d4d8987c953aa6ded91b7bd6d6a393"], 0x51b) 16:40:06 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r10, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r2, 0x0, 0x0) [ 1150.816982][T18265] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1150.851302][T18265] CPU: 1 PID: 18265 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1150.859345][T18265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1150.869416][T18265] Call Trace: [ 1150.872792][T18265] dump_stack+0xf5/0x159 [ 1150.877076][T18265] dump_header+0xaa/0x449 [ 1150.881451][T18265] oom_kill_process.cold+0x10/0x15 [ 1150.886633][T18265] out_of_memory+0x231/0xa00 [ 1150.891385][T18265] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1150.897116][T18265] mem_cgroup_out_of_memory+0x128/0x150 [ 1150.902798][T18265] try_charge+0xb3a/0xbc0 [ 1150.907179][T18265] ? rcu_note_context_switch+0x700/0x760 [ 1150.912866][T18265] mem_cgroup_try_charge+0xd2/0x260 [ 1150.918108][T18265] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1150.923791][T18265] wp_page_copy+0x322/0x1160 [ 1150.928493][T18265] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1150.934199][T18265] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1150.939927][T18265] do_wp_page+0x192/0x11f0 [ 1150.944377][T18265] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1150.950042][T18265] __handle_mm_fault+0x1c07/0x2cb0 [ 1150.955226][T18265] handle_mm_fault+0x21b/0x530 [ 1150.960119][T18265] __do_page_fault+0x3fb/0x9e0 [ 1150.964931][T18265] do_page_fault+0x54/0x233 [ 1150.969567][T18265] ? prepare_exit_to_usermode+0x154/0x1a0 [ 1150.975367][T18265] page_fault+0x34/0x40 [ 1150.979541][T18265] RIP: 0033:0x431016 [ 1150.983498][T18265] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 cc 5c 64 00 85 c0 0f 84 [ 1151.003210][T18265] RSP: 002b:00007ffdc38e28f0 EFLAGS: 00010206 [ 1151.009341][T18265] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 16:40:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000003c0)=""/179, 0x1a, 0xb3}, 0x20) [ 1151.017409][T18265] RDX: 0000000000bfc930 RSI: 0000000000c04970 RDI: 0000000000000003 [ 1151.025416][T18265] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000000bfb940 [ 1151.033506][T18265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1151.041497][T18265] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 16:40:07 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4], 0x2}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1151.195008][T18265] memory: usage 264kB, limit 0kB, failcnt 942 [ 1151.202524][T18265] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1151.233196][T18265] Memory cgroup stats for /syz1: [ 1151.233477][T18265] anon 36864 [ 1151.233477][T18265] file 65536 [ 1151.233477][T18265] kernel_stack 36864 [ 1151.233477][T18265] slab 196608 [ 1151.233477][T18265] sock 0 [ 1151.233477][T18265] shmem 0 [ 1151.233477][T18265] file_mapped 0 [ 1151.233477][T18265] file_dirty 0 [ 1151.233477][T18265] file_writeback 0 [ 1151.233477][T18265] anon_thp 0 [ 1151.233477][T18265] inactive_anon 135168 [ 1151.233477][T18265] active_anon 36864 [ 1151.233477][T18265] inactive_file 0 [ 1151.233477][T18265] active_file 0 [ 1151.233477][T18265] unevictable 135168 [ 1151.233477][T18265] slab_reclaimable 135168 [ 1151.233477][T18265] slab_unreclaimable 61440 [ 1151.233477][T18265] pgfault 57651 [ 1151.233477][T18265] pgmajfault 0 [ 1151.233477][T18265] workingset_refault 0 [ 1151.233477][T18265] workingset_activate 0 [ 1151.233477][T18265] workingset_nodereclaim 0 [ 1151.233477][T18265] pgrefill 269 [ 1151.233477][T18265] pgscan 267 [ 1151.233477][T18265] pgsteal 33 [ 1151.233477][T18265] pgactivate 231 16:40:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040), 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:40:07 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:40:07 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb", 0x2) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:40:07 executing program 0: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, 0x0, &(0x7f0000000040)) [ 1151.408915][T18265] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=18265,uid=0 [ 1151.490684][T18265] Memory cgroup out of memory: Killed process 18265 (syz-executor.1) total-vm:72456kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 [ 1151.586535][ T1063] oom_reaper: reaped process 18265 (syz-executor.1), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 16:40:07 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:40:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040), 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:40:07 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) 16:40:07 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:40:07 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb", 0x2) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) [ 1153.025700][T14669] device bridge_slave_1 left promiscuous mode [ 1153.031985][T14669] bridge0: port 2(bridge_slave_1) entered disabled state [ 1153.095850][T14669] device bridge_slave_0 left promiscuous mode [ 1153.102191][T14669] bridge0: port 1(bridge_slave_0) entered disabled state [ 1153.905332][T14669] device hsr_slave_0 left promiscuous mode [ 1153.945068][T14669] device hsr_slave_1 left promiscuous mode [ 1154.013168][T14669] team0 (unregistering): Port device team_slave_1 removed [ 1154.024459][T14669] team0 (unregistering): Port device team_slave_0 removed [ 1154.035655][T14669] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1154.079930][T14669] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1154.159796][T14669] bond0 (unregistering): Released all slaves [ 1154.263068][T18325] IPVS: ftp: loaded support on port[0] = 21 [ 1154.339480][T18325] chnl_net:caif_netlink_parms(): no params data found [ 1154.372027][T18325] bridge0: port 1(bridge_slave_0) entered blocking state [ 1154.380186][T18325] bridge0: port 1(bridge_slave_0) entered disabled state [ 1154.390437][T18325] device bridge_slave_0 entered promiscuous mode [ 1154.435454][T18325] bridge0: port 2(bridge_slave_1) entered blocking state [ 1154.442686][T18325] bridge0: port 2(bridge_slave_1) entered disabled state [ 1154.451093][T18325] device bridge_slave_1 entered promiscuous mode [ 1154.473551][T18325] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1154.484759][T18325] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1154.508039][T18325] team0: Port device team_slave_0 added [ 1154.515241][T18325] team0: Port device team_slave_1 added [ 1154.618325][T18325] device hsr_slave_0 entered promiscuous mode [ 1154.715357][T18325] device hsr_slave_1 entered promiscuous mode [ 1154.765021][T18325] debugfs: Directory 'hsr0' with parent '/' already present! [ 1154.786643][T18325] bridge0: port 2(bridge_slave_1) entered blocking state [ 1154.793722][T18325] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1154.801078][T18325] bridge0: port 1(bridge_slave_0) entered blocking state [ 1154.808228][T18325] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1154.860848][T18325] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1154.874838][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1154.888450][ T4362] bridge0: port 1(bridge_slave_0) entered disabled state [ 1154.899672][ T4362] bridge0: port 2(bridge_slave_1) entered disabled state [ 1154.916345][T18325] 8021q: adding VLAN 0 to HW filter on device team0 [ 1154.929307][ T4363] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1154.938121][ T4363] bridge0: port 1(bridge_slave_0) entered blocking state [ 1154.945215][ T4363] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1154.971373][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1154.980283][ T2912] bridge0: port 2(bridge_slave_1) entered blocking state [ 1154.987397][ T2912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1154.998193][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1155.007730][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1155.020009][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1155.036678][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1155.046401][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1155.056530][T18325] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1155.075358][T18325] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1155.451900][T18335] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1155.462273][T18335] CPU: 0 PID: 18335 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1155.470224][T18335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1155.480295][T18335] Call Trace: [ 1155.483645][T18335] dump_stack+0xf5/0x159 [ 1155.487916][T18335] dump_header+0xaa/0x449 [ 1155.492271][T18335] oom_kill_process.cold+0x10/0x15 [ 1155.497467][T18335] out_of_memory+0x231/0xa00 [ 1155.502109][T18335] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1155.507891][T18335] mem_cgroup_out_of_memory+0x128/0x150 [ 1155.513435][T18335] memory_max_write+0x17b/0x250 [ 1155.518356][T18335] cgroup_file_write+0x119/0x320 [ 1155.523295][T18335] ? high_work_func+0x30/0x30 [ 1155.528045][T18335] kernfs_fop_write+0x1f4/0x2e0 [ 1155.532988][T18335] ? cgroup_css.part.0+0x90/0x90 [ 1155.538014][T18335] __vfs_write+0x67/0xc0 [ 1155.542297][T18335] ? kernfs_seq_show+0xe0/0xe0 [ 1155.547053][T18335] vfs_write+0x18a/0x390 [ 1155.551290][T18335] ksys_write+0xd5/0x1b0 [ 1155.555572][T18335] __x64_sys_write+0x4c/0x60 [ 1155.560231][T18335] do_syscall_64+0xcc/0x370 [ 1155.564729][T18335] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1155.570783][T18335] RIP: 0033:0x459f39 [ 1155.574732][T18335] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1155.594337][T18335] RSP: 002b:00007ffac0b35c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1155.602743][T18335] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1155.610747][T18335] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000b [ 1155.618710][T18335] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1155.626708][T18335] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffac0b366d4 [ 1155.634745][T18335] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1155.644619][T18335] memory: usage 4668kB, limit 0kB, failcnt 871 [ 1155.651644][T18335] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1155.659357][T18335] Memory cgroup stats for /syz3: [ 1155.659641][T18335] anon 4354048 [ 1155.659641][T18335] file 45056 [ 1155.659641][T18335] kernel_stack 73728 [ 1155.659641][T18335] slab 282624 [ 1155.659641][T18335] sock 0 [ 1155.659641][T18335] shmem 0 [ 1155.659641][T18335] file_mapped 0 [ 1155.659641][T18335] file_dirty 135168 [ 1155.659641][T18335] file_writeback 0 [ 1155.659641][T18335] anon_thp 4194304 [ 1155.659641][T18335] inactive_anon 0 [ 1155.659641][T18335] active_anon 4354048 [ 1155.659641][T18335] inactive_file 135168 [ 1155.659641][T18335] active_file 135168 [ 1155.659641][T18335] unevictable 135168 [ 1155.659641][T18335] slab_reclaimable 135168 [ 1155.659641][T18335] slab_unreclaimable 147456 [ 1155.659641][T18335] pgfault 53724 [ 1155.659641][T18335] pgmajfault 0 [ 1155.659641][T18335] workingset_refault 0 [ 1155.659641][T18335] workingset_activate 0 [ 1155.659641][T18335] workingset_nodereclaim 0 [ 1155.659641][T18335] pgrefill 198 [ 1155.659641][T18335] pgscan 198 [ 1155.659641][T18335] pgsteal 0 [ 1155.659641][T18335] pgactivate 198 [ 1155.758225][T18335] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=18331,uid=0 [ 1155.775146][T18335] Memory cgroup out of memory: Killed process 18331 (syz-executor.3) total-vm:72852kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:147456kB oom_score_adj:1000 [ 1155.800729][ T1063] oom_reaper: reaped process 18331 (syz-executor.3), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB 16:40:12 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r10, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r2, 0x0, 0x0) 16:40:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040), 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:40:12 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:40:12 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, 0x0) 16:40:12 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:40:12 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb", 0x2) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) [ 1156.475813][T18325] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1156.518576][T18325] CPU: 1 PID: 18325 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1156.526806][T18325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1156.536905][T18325] Call Trace: [ 1156.540288][T18325] dump_stack+0xf5/0x159 [ 1156.544684][T18325] dump_header+0xaa/0x449 [ 1156.549098][T18325] oom_kill_process.cold+0x10/0x15 [ 1156.555779][T18325] out_of_memory+0x231/0xa00 [ 1156.560415][T18325] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1156.566119][T18325] mem_cgroup_out_of_memory+0x128/0x150 [ 1156.571973][T18325] try_charge+0xb3a/0xbc0 [ 1156.576460][T18325] ? rcu_note_context_switch+0x700/0x760 [ 1156.582237][T18325] mem_cgroup_try_charge+0xd2/0x260 [ 1156.587541][T18325] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1156.593265][T18325] __handle_mm_fault+0x179a/0x2cb0 [ 1156.598459][T18325] handle_mm_fault+0x21b/0x530 [ 1156.603283][T18325] __do_page_fault+0x3fb/0x9e0 [ 1156.608132][T18325] do_page_fault+0x54/0x233 [ 1156.612695][T18325] ? do_syscall_64+0x270/0x370 [ 1156.617608][T18325] page_fault+0x34/0x40 [ 1156.621788][T18325] RIP: 0033:0x403a42 [ 1156.625743][T18325] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 19 8f 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 39 44 05 00 48 [ 1156.645464][T18325] RSP: 002b:00007ffc1c7e1fa0 EFLAGS: 00010246 [ 1156.651557][T18325] RAX: 0000000000000000 RBX: 000000000011a15d RCX: 00000000004139f0 [ 1156.659639][T18325] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffc1c7e30d0 [ 1156.667644][T18325] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000000001b15940 [ 1156.676505][T18325] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc1c7e30d0 [ 1156.684597][T18325] R13: 00007ffc1c7e30c0 R14: 0000000000000000 R15: 00007ffc1c7e30d0 16:40:12 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = eventfd(0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4008af03, &(0x7f0000000000)=r3) 16:40:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) [ 1156.764940][T18325] memory: usage 260kB, limit 0kB, failcnt 888 [ 1156.773333][T18325] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1156.838541][T18325] Memory cgroup stats for /syz3: [ 1156.838789][T18325] anon 81920 [ 1156.838789][T18325] file 45056 [ 1156.838789][T18325] kernel_stack 0 [ 1156.838789][T18325] slab 282624 [ 1156.838789][T18325] sock 0 [ 1156.838789][T18325] shmem 0 [ 1156.838789][T18325] file_mapped 0 [ 1156.838789][T18325] file_dirty 135168 [ 1156.838789][T18325] file_writeback 0 [ 1156.838789][T18325] anon_thp 0 [ 1156.838789][T18325] inactive_anon 0 [ 1156.838789][T18325] active_anon 81920 [ 1156.838789][T18325] inactive_file 135168 16:40:12 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:40:12 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96", 0x3) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0b01000408000000000000000000000000000000000000000800000000000000bb1153e6af9cd7b1ef65fac3b3cd6cd20a1f269ccf05c41692a6709b20dfa865407fde32a87a282c299f70e0bd50cb4809000000d0f3970729929dd758d941915b47c2a9b73e8e70be31d660c625ae235530ccd390b9a0a333cf2ef7330be96ab7e6db31afb0b44ced47bc6a91f8dc81c601000000000000007484b2724c4f472e0357f9fa7deddfb628e52a1b3ec279b2382305931d830c3c0027b5c47858fb16a20989c5bb0821bb7ef7a8cb6d2efe331705bb1d227376e06ac6cad52d2c30b173f738d65ca7cc9f890186d8701b975c9cb30e545b311628ee22b2c799bc3fb9c79f681f119d39f4cd37c3500c694ccf0000000000009029bb1618801b3f3c000000004e8e8bc665a987f44bf6a7f0728b662a05cca657aa6382b8fcc6672c550f660c5c371bd836b4042ea3d4def643a5ab3f17cd0000000000000000000000000000000000000000000000000000000000e6cc9c00000000000000000000000000001300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bf19e066d12850f00bda2ab100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ea0b37f52ec4ed91870f4b8940a9bddbe941420c855f3fbe63a05250fd13ec07c327c47cba0303f426054d157cee8387a44b9d278ff41713d4d8987c953aa6ded91b7bd6d6a393"], 0x51b) [ 1156.838789][T18325] active_file 135168 [ 1156.838789][T18325] unevictable 135168 [ 1156.838789][T18325] slab_reclaimable 135168 [ 1156.838789][T18325] slab_unreclaimable 147456 [ 1156.838789][T18325] pgfault 53724 [ 1156.838789][T18325] pgmajfault 0 [ 1156.838789][T18325] workingset_refault 0 [ 1156.838789][T18325] workingset_activate 0 [ 1156.838789][T18325] workingset_nodereclaim 0 [ 1156.838789][T18325] pgrefill 198 [ 1156.838789][T18325] pgscan 198 [ 1156.838789][T18325] pgsteal 0 [ 1156.838789][T18325] pgactivate 198 16:40:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:40:13 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1157.263257][T18325] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=18325,uid=0 [ 1157.340868][T18325] Memory cgroup out of memory: Killed process 18325 (syz-executor.3) total-vm:72456kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 [ 1157.436322][ T1063] oom_reaper: reaped process 18325 (syz-executor.3), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 16:40:13 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r10, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r2, 0x0, 0x0) 16:40:13 executing program 0: r0 = memfd_create(&(0x7f0000000180)='\xb3', 0x0) r1 = memfd_create(&(0x7f0000000180)='\xb3', 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000080)=ANY=[], 0x29) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r1, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) [ 1158.795689][T14666] device bridge_slave_1 left promiscuous mode [ 1158.802002][T14666] bridge0: port 2(bridge_slave_1) entered disabled state [ 1158.865779][T14666] device bridge_slave_0 left promiscuous mode [ 1158.872594][T14666] bridge0: port 1(bridge_slave_0) entered disabled state [ 1159.685332][T14666] device hsr_slave_0 left promiscuous mode [ 1159.725172][T14666] device hsr_slave_1 left promiscuous mode [ 1159.773749][T14666] team0 (unregistering): Port device team_slave_1 removed [ 1159.785815][T14666] team0 (unregistering): Port device team_slave_0 removed [ 1159.797167][T14666] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1159.859260][T14666] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1159.921547][T14666] bond0 (unregistering): Released all slaves [ 1160.014107][T18376] IPVS: ftp: loaded support on port[0] = 21 [ 1160.078133][T18376] chnl_net:caif_netlink_parms(): no params data found [ 1160.110116][T18376] bridge0: port 1(bridge_slave_0) entered blocking state [ 1160.117897][T18376] bridge0: port 1(bridge_slave_0) entered disabled state [ 1160.126430][T18376] device bridge_slave_0 entered promiscuous mode [ 1160.134418][T18376] bridge0: port 2(bridge_slave_1) entered blocking state [ 1160.142176][T18376] bridge0: port 2(bridge_slave_1) entered disabled state [ 1160.150450][T18376] device bridge_slave_1 entered promiscuous mode [ 1160.227944][T18376] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1160.242237][T18376] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1160.270668][T18376] team0: Port device team_slave_0 added [ 1160.281445][T18376] team0: Port device team_slave_1 added [ 1160.360851][T18376] device hsr_slave_0 entered promiscuous mode [ 1160.455446][T18376] device hsr_slave_1 entered promiscuous mode [ 1160.505079][T18376] debugfs: Directory 'hsr0' with parent '/' already present! [ 1160.526912][T18376] bridge0: port 2(bridge_slave_1) entered blocking state [ 1160.534020][T18376] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1160.541544][T18376] bridge0: port 1(bridge_slave_0) entered blocking state [ 1160.548820][T18376] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1160.603539][T18376] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1160.623366][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1160.633105][ T2222] bridge0: port 1(bridge_slave_0) entered disabled state [ 1160.646777][ T2222] bridge0: port 2(bridge_slave_1) entered disabled state [ 1160.666732][T18376] 8021q: adding VLAN 0 to HW filter on device team0 [ 1160.683490][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1160.692998][ T2222] bridge0: port 1(bridge_slave_0) entered blocking state [ 1160.700470][ T2222] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1160.731873][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1160.742211][ T4358] bridge0: port 2(bridge_slave_1) entered blocking state [ 1160.749534][ T4358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1160.765116][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1160.774596][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1160.789500][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1160.806943][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1160.816641][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1160.827650][T18376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1160.847243][T18376] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1161.094421][T18384] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1161.106204][T18384] CPU: 1 PID: 18384 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1161.114116][T18384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1161.125125][T18384] Call Trace: [ 1161.128451][T18384] dump_stack+0xf5/0x159 [ 1161.132876][T18384] dump_header+0xaa/0x449 [ 1161.137247][T18384] oom_kill_process.cold+0x10/0x15 [ 1161.142382][T18384] out_of_memory+0x231/0xa00 [ 1161.147240][T18384] mem_cgroup_out_of_memory+0x128/0x150 [ 1161.153002][T18384] memory_max_write+0x17b/0x250 [ 1161.158054][T18384] cgroup_file_write+0x119/0x320 [ 1161.163106][T18384] ? high_work_func+0x30/0x30 [ 1161.167950][T18384] kernfs_fop_write+0x1f4/0x2e0 [ 1161.172931][T18384] ? cgroup_css.part.0+0x90/0x90 [ 1161.178479][T18384] __vfs_write+0x67/0xc0 [ 1161.182731][T18384] ? kernfs_seq_show+0xe0/0xe0 [ 1161.187514][T18384] vfs_write+0x18a/0x390 [ 1161.191777][T18384] ksys_write+0xd5/0x1b0 [ 1161.196046][T18384] __x64_sys_write+0x4c/0x60 [ 1161.200999][T18384] do_syscall_64+0xcc/0x370 [ 1161.205527][T18384] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1161.211662][T18384] RIP: 0033:0x459f39 [ 1161.215919][T18384] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1161.235598][T18384] RSP: 002b:00007feeafc72c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1161.244015][T18384] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1161.252128][T18384] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009 [ 1161.260426][T18384] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1161.268426][T18384] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feeafc736d4 [ 1161.276712][T18384] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1161.287305][T18384] memory: usage 4596kB, limit 0kB, failcnt 943 [ 1161.293726][T18384] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1161.301005][T18384] Memory cgroup stats for /syz1: [ 1161.302342][T18384] anon 4272128 [ 1161.302342][T18384] file 65536 [ 1161.302342][T18384] kernel_stack 36864 [ 1161.302342][T18384] slab 196608 [ 1161.302342][T18384] sock 0 [ 1161.302342][T18384] shmem 0 [ 1161.302342][T18384] file_mapped 0 [ 1161.302342][T18384] file_dirty 0 [ 1161.302342][T18384] file_writeback 0 [ 1161.302342][T18384] anon_thp 4194304 [ 1161.302342][T18384] inactive_anon 135168 [ 1161.302342][T18384] active_anon 4272128 [ 1161.302342][T18384] inactive_file 0 [ 1161.302342][T18384] active_file 0 [ 1161.302342][T18384] unevictable 135168 [ 1161.302342][T18384] slab_reclaimable 135168 [ 1161.302342][T18384] slab_unreclaimable 61440 [ 1161.302342][T18384] pgfault 57750 [ 1161.302342][T18384] pgmajfault 0 [ 1161.302342][T18384] workingset_refault 0 [ 1161.302342][T18384] workingset_activate 0 [ 1161.302342][T18384] workingset_nodereclaim 0 [ 1161.302342][T18384] pgrefill 269 [ 1161.302342][T18384] pgscan 267 [ 1161.302342][T18384] pgsteal 33 [ 1161.302342][T18384] pgactivate 231 [ 1161.402271][T18384] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=18382,uid=0 [ 1161.419882][T18384] Memory cgroup out of memory: Killed process 18382 (syz-executor.1) total-vm:72588kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 1161.441821][ T1063] oom_reaper: reaped process 18382 (syz-executor.1), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB 16:40:17 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:40:17 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96", 0x3) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:40:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:40:17 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:40:17 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000480)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000001800)={0x0, [], 0x4}) 16:40:17 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r10, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r2, 0x0, 0x0) [ 1161.548264][T18376] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1161.613938][T18376] CPU: 0 PID: 18376 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1161.622075][T18376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1161.632352][T18376] Call Trace: [ 1161.636044][T18376] dump_stack+0xf5/0x159 [ 1161.640384][T18376] dump_header+0xaa/0x449 [ 1161.644771][T18376] oom_kill_process.cold+0x10/0x15 [ 1161.650130][T18376] out_of_memory+0x231/0xa00 [ 1161.654951][T18376] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1161.660749][T18376] mem_cgroup_out_of_memory+0x128/0x150 [ 1161.666431][T18376] try_charge+0xb3a/0xbc0 [ 1161.671113][T18376] ? rcu_note_context_switch+0x700/0x760 [ 1161.677212][T18376] mem_cgroup_try_charge+0xd2/0x260 [ 1161.683859][T18376] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1161.690542][T18376] __handle_mm_fault+0x179a/0x2cb0 [ 1161.695725][T18376] handle_mm_fault+0x21b/0x530 [ 1161.700565][T18376] __do_page_fault+0x3fb/0x9e0 [ 1161.705515][T18376] do_page_fault+0x54/0x233 [ 1161.710260][T18376] ? do_syscall_64+0x270/0x370 [ 1161.715097][T18376] page_fault+0x34/0x40 [ 1161.719558][T18376] RIP: 0033:0x403a42 [ 1161.723844][T18376] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 19 8f 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 39 44 05 00 48 [ 1161.744662][T18376] RSP: 002b:00007ffd76d70f80 EFLAGS: 00010246 [ 1161.750850][T18376] RAX: 0000000000000000 RBX: 000000000011b74d RCX: 00000000004139f0 [ 1161.759223][T18376] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffd76d720b0 [ 1161.767570][T18376] RBP: 0000000000000002 R08: 0000000000000001 R09: 00000000012c9940 [ 1161.775765][T18376] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffd76d720b0 [ 1161.784079][T18376] R13: 00007ffd76d720a0 R14: 0000000000000000 R15: 00007ffd76d720b0 16:40:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:40:17 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1161.894991][T18376] memory: usage 248kB, limit 0kB, failcnt 951 [ 1161.903843][T18376] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1161.932763][T18376] Memory cgroup stats for /syz1: [ 1161.933102][T18376] anon 57344 [ 1161.933102][T18376] file 65536 [ 1161.933102][T18376] kernel_stack 36864 [ 1161.933102][T18376] slab 196608 [ 1161.933102][T18376] sock 0 [ 1161.933102][T18376] shmem 0 [ 1161.933102][T18376] file_mapped 0 [ 1161.933102][T18376] file_dirty 0 [ 1161.933102][T18376] file_writeback 0 [ 1161.933102][T18376] anon_thp 0 [ 1161.933102][T18376] inactive_anon 135168 [ 1161.933102][T18376] active_anon 57344 [ 1161.933102][T18376] inactive_file 0 [ 1161.933102][T18376] active_file 0 [ 1161.933102][T18376] unevictable 135168 [ 1161.933102][T18376] slab_reclaimable 135168 [ 1161.933102][T18376] slab_unreclaimable 61440 [ 1161.933102][T18376] pgfault 57750 [ 1161.933102][T18376] pgmajfault 0 [ 1161.933102][T18376] workingset_refault 0 [ 1161.933102][T18376] workingset_activate 0 [ 1161.933102][T18376] workingset_nodereclaim 0 [ 1161.933102][T18376] pgrefill 269 [ 1161.933102][T18376] pgscan 267 [ 1161.933102][T18376] pgsteal 33 [ 1161.933102][T18376] pgactivate 231 16:40:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:40:17 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96", 0x3) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:40:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$NS_GET_OWNER_UID(r0, 0xb704, 0x0) [ 1162.081851][T18376] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=18376,uid=0 [ 1162.098871][T18376] Memory cgroup out of memory: Killed process 18376 (syz-executor.1) total-vm:72456kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 16:40:18 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1162.242365][ T1063] oom_reaper: reaped process 18376 (syz-executor.1), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 16:40:18 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:40:18 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(0xffffffffffffffff, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:40:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000340)=@routing, 0x8) 16:40:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:40:18 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1163.875813][T14666] device bridge_slave_1 left promiscuous mode [ 1163.882824][T14666] bridge0: port 2(bridge_slave_1) entered disabled state [ 1163.946097][T14666] device bridge_slave_0 left promiscuous mode [ 1163.954059][T14666] bridge0: port 1(bridge_slave_0) entered disabled state [ 1164.785330][T14666] device hsr_slave_0 left promiscuous mode [ 1164.835039][T14666] device hsr_slave_1 left promiscuous mode [ 1164.893638][T14666] team0 (unregistering): Port device team_slave_1 removed [ 1164.907804][T14666] team0 (unregistering): Port device team_slave_0 removed [ 1164.919592][T14666] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1164.959181][T14666] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1165.041076][T14666] bond0 (unregistering): Released all slaves [ 1165.144008][T18432] IPVS: ftp: loaded support on port[0] = 21 [ 1165.216343][T18432] chnl_net:caif_netlink_parms(): no params data found [ 1165.249879][T18432] bridge0: port 1(bridge_slave_0) entered blocking state [ 1165.257263][T18432] bridge0: port 1(bridge_slave_0) entered disabled state [ 1165.265892][T18432] device bridge_slave_0 entered promiscuous mode [ 1165.273955][T18432] bridge0: port 2(bridge_slave_1) entered blocking state [ 1165.281108][T18432] bridge0: port 2(bridge_slave_1) entered disabled state [ 1165.290532][T18432] device bridge_slave_1 entered promiscuous mode [ 1165.367475][T18432] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1165.379186][T18432] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1165.402359][T18432] team0: Port device team_slave_0 added [ 1165.409865][T18432] team0: Port device team_slave_1 added [ 1165.478050][T18432] device hsr_slave_0 entered promiscuous mode [ 1165.525440][T18432] device hsr_slave_1 entered promiscuous mode [ 1165.565110][T18432] debugfs: Directory 'hsr0' with parent '/' already present! [ 1165.586179][T18432] bridge0: port 2(bridge_slave_1) entered blocking state [ 1165.593450][T18432] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1165.600933][T18432] bridge0: port 1(bridge_slave_0) entered blocking state [ 1165.608306][T18432] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1165.661889][T18432] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1165.680514][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1165.689708][ T3501] bridge0: port 1(bridge_slave_0) entered disabled state [ 1165.703633][ T3501] bridge0: port 2(bridge_slave_1) entered disabled state [ 1165.724303][T18432] 8021q: adding VLAN 0 to HW filter on device team0 [ 1165.740772][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1165.750434][ T3501] bridge0: port 1(bridge_slave_0) entered blocking state [ 1165.757539][ T3501] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1165.781194][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1165.796297][ T4358] bridge0: port 2(bridge_slave_1) entered blocking state [ 1165.803763][ T4358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1165.832146][T18432] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1165.855043][T18432] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1165.876482][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1165.890722][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1165.901232][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1165.915721][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1165.933453][T18432] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1165.945239][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1165.953568][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1166.340861][T18442] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1166.366348][T18442] CPU: 1 PID: 18442 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1166.375421][T18442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1166.386868][T18442] Call Trace: [ 1166.390345][T18442] dump_stack+0xf5/0x159 [ 1166.394783][T18442] dump_header+0xaa/0x449 [ 1166.399335][T18442] oom_kill_process.cold+0x10/0x15 [ 1166.404625][T18442] out_of_memory+0x231/0xa00 [ 1166.409449][T18442] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1166.415207][T18442] mem_cgroup_out_of_memory+0x128/0x150 [ 1166.421080][T18442] memory_max_write+0x17b/0x250 [ 1166.426084][T18442] cgroup_file_write+0x119/0x320 [ 1166.432189][T18442] ? high_work_func+0x30/0x30 [ 1166.436908][T18442] kernfs_fop_write+0x1f4/0x2e0 [ 1166.442001][T18442] ? cgroup_css.part.0+0x90/0x90 [ 1166.447345][T18442] __vfs_write+0x67/0xc0 [ 1166.451875][T18442] ? kernfs_seq_show+0xe0/0xe0 [ 1166.456897][T18442] vfs_write+0x18a/0x390 [ 1166.461564][T18442] ksys_write+0xd5/0x1b0 [ 1166.466153][T18442] __x64_sys_write+0x4c/0x60 [ 1166.471477][T18442] do_syscall_64+0xcc/0x370 [ 1166.476512][T18442] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1166.482476][T18442] RIP: 0033:0x459f39 [ 1166.486573][T18442] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1166.506586][T18442] RSP: 002b:00007f84990f8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1166.515191][T18442] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1166.523580][T18442] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 1166.535956][T18442] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1166.543930][T18442] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f84990f96d4 [ 1166.552316][T18442] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1166.561015][T18442] memory: usage 4664kB, limit 0kB, failcnt 897 [ 1166.567502][T18442] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1166.574558][T18442] Memory cgroup stats for /syz3: [ 1166.574754][T18442] anon 4349952 [ 1166.574754][T18442] file 45056 [ 1166.574754][T18442] kernel_stack 36864 [ 1166.574754][T18442] slab 282624 [ 1166.574754][T18442] sock 0 [ 1166.574754][T18442] shmem 0 [ 1166.574754][T18442] file_mapped 0 [ 1166.574754][T18442] file_dirty 135168 [ 1166.574754][T18442] file_writeback 0 [ 1166.574754][T18442] anon_thp 4194304 [ 1166.574754][T18442] inactive_anon 0 [ 1166.574754][T18442] active_anon 4349952 [ 1166.574754][T18442] inactive_file 135168 [ 1166.574754][T18442] active_file 135168 [ 1166.574754][T18442] unevictable 135168 [ 1166.574754][T18442] slab_reclaimable 135168 [ 1166.574754][T18442] slab_unreclaimable 147456 [ 1166.574754][T18442] pgfault 53823 [ 1166.574754][T18442] pgmajfault 0 [ 1166.574754][T18442] workingset_refault 0 [ 1166.574754][T18442] workingset_activate 0 [ 1166.574754][T18442] workingset_nodereclaim 0 [ 1166.574754][T18442] pgrefill 198 [ 1166.574754][T18442] pgscan 198 [ 1166.574754][T18442] pgsteal 0 [ 1166.574754][T18442] pgactivate 198 [ 1166.675337][T18442] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=18438,uid=0 [ 1166.695565][T18442] Memory cgroup out of memory: Killed process 18438 (syz-executor.3) total-vm:72852kB, anon-rss:4192kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:147456kB oom_score_adj:1000 [ 1166.716001][ T1063] oom_reaper: reaped process 18438 (syz-executor.3), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB 16:40:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100), 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:40:23 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:40:23 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r10, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r2, 0x0, 0x0) 16:40:23 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(0xffffffffffffffff, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:40:23 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:40:23 executing program 0: ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x200000) sched_setscheduler(0x0, 0x0, &(0x7f0000000000)=0x7b81) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000040)=0x6) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0xc074510c, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) epoll_create1(0x80000) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000440)={[0x4, 0x0, 0x0, 0x100000000001, 0x0, 0x81, 0x40000000004cd]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x81) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 1167.438841][T18432] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1167.477166][T18432] CPU: 1 PID: 18432 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1167.486336][T18432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1167.496676][T18432] Call Trace: [ 1167.500215][T18432] dump_stack+0xf5/0x159 [ 1167.504634][T18432] dump_header+0xaa/0x449 [ 1167.509169][T18432] oom_kill_process.cold+0x10/0x15 [ 1167.514506][T18432] out_of_memory+0x231/0xa00 [ 1167.519238][T18432] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1167.525182][T18432] mem_cgroup_out_of_memory+0x128/0x150 [ 1167.530921][T18432] try_charge+0xb3a/0xbc0 [ 1167.535393][T18432] ? rcu_note_context_switch+0x700/0x760 [ 1167.541163][T18432] mem_cgroup_try_charge+0xd2/0x260 [ 1167.546673][T18432] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1167.552543][T18432] wp_page_copy+0x322/0x1160 [ 1167.557257][T18432] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1167.562956][T18432] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1167.569311][T18432] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1167.575127][T18432] do_wp_page+0x192/0x11f0 [ 1167.579895][T18432] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1167.585586][T18432] __handle_mm_fault+0x1c07/0x2cb0 [ 1167.590774][T18432] handle_mm_fault+0x21b/0x530 [ 1167.595600][T18432] __do_page_fault+0x3fb/0x9e0 [ 1167.600576][T18432] do_page_fault+0x54/0x233 [ 1167.605909][T18432] ? do_syscall_64+0x270/0x370 [ 1167.611105][T18432] page_fault+0x34/0x40 [ 1167.615361][T18432] RIP: 0033:0x403a42 [ 1167.619447][T18432] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 19 8f 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 39 44 05 00 48 [ 1167.639468][T18432] RSP: 002b:00007fffb240bd50 EFLAGS: 00010246 [ 1167.646419][T18432] RAX: 0000000000000000 RBX: 000000000011cbe6 RCX: 00000000004139f0 [ 1167.654572][T18432] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007fffb240ce80 [ 1167.662608][T18432] RBP: 0000000000000002 R08: 0000000000000001 R09: 00000000014e1940 [ 1167.670779][T18432] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fffb240ce80 [ 1167.678908][T18432] R13: 00007fffb240ce70 R14: 0000000000000000 R15: 00007fffb240ce80 16:40:23 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:40:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100), 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) [ 1167.875020][T18432] memory: usage 256kB, limit 0kB, failcnt 914 [ 1167.881154][T18432] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1167.907253][T18432] Memory cgroup stats for /syz3: [ 1167.907479][T18432] anon 40960 [ 1167.907479][T18432] file 45056 [ 1167.907479][T18432] kernel_stack 36864 [ 1167.907479][T18432] slab 282624 [ 1167.907479][T18432] sock 0 [ 1167.907479][T18432] shmem 0 [ 1167.907479][T18432] file_mapped 0 [ 1167.907479][T18432] file_dirty 135168 [ 1167.907479][T18432] file_writeback 0 [ 1167.907479][T18432] anon_thp 0 [ 1167.907479][T18432] inactive_anon 0 [ 1167.907479][T18432] active_anon 40960 [ 1167.907479][T18432] inactive_file 135168 [ 1167.907479][T18432] active_file 135168 [ 1167.907479][T18432] unevictable 135168 [ 1167.907479][T18432] slab_reclaimable 135168 [ 1167.907479][T18432] slab_unreclaimable 147456 [ 1167.907479][T18432] pgfault 53823 [ 1167.907479][T18432] pgmajfault 0 [ 1167.907479][T18432] workingset_refault 0 [ 1167.907479][T18432] workingset_activate 0 [ 1167.907479][T18432] workingset_nodereclaim 0 [ 1167.907479][T18432] pgrefill 198 [ 1167.907479][T18432] pgscan 198 [ 1167.907479][T18432] pgsteal 0 [ 1167.907479][T18432] pgactivate 198 [ 1168.005467][T18432] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=18432,uid=0 [ 1168.021531][T18432] Memory cgroup out of memory: Killed process 18432 (syz-executor.3) total-vm:72456kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 16:40:24 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(0xffffffffffffffff, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0b01000408000000000000000000000000000000000000000800000000000000bb1153e6af9cd7b1ef65fac3b3cd6cd20a1f269ccf05c41692a6709b20dfa865407fde32a87a282c299f70e0bd50cb4809000000d0f3970729929dd758d941915b47c2a9b73e8e70be31d660c625ae235530ccd390b9a0a333cf2ef7330be96ab7e6db31afb0b44ced47bc6a91f8dc81c601000000000000007484b2724c4f472e0357f9fa7deddfb628e52a1b3ec279b2382305931d830c3c0027b5c47858fb16a20989c5bb0821bb7ef7a8cb6d2efe331705bb1d227376e06ac6cad52d2c30b173f738d65ca7cc9f890186d8701b975c9cb30e545b311628ee22b2c799bc3fb9c79f681f119d39f4cd37c3500c694ccf0000000000009029bb1618801b3f3c000000004e8e8bc665a987f44bf6a7f0728b662a05cca657aa6382b8fcc6672c550f660c5c371bd836b4042ea3d4def643a5ab3f17cd0000000000000000000000000000000000000000000000000000000000e6cc9c00000000000000000000000000001300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bf19e066d12850f00bda2ab100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ea0b37f52ec4ed91870f4b8940a9bddbe941420c855f3fbe63a05250fd13ec07c327c47cba0303f426054d157cee8387a44b9d278ff41713d4d8987c953aa6ded91b7bd6d6a393"], 0x51b) [ 1168.076547][ T1063] oom_reaper: reaped process 18432 (syz-executor.3), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 16:40:24 executing program 0: 16:40:24 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:40:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100), 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:40:24 executing program 0: [ 1169.595543][T14669] device bridge_slave_1 left promiscuous mode [ 1169.601770][T14669] bridge0: port 2(bridge_slave_1) entered disabled state [ 1169.666302][T14669] device bridge_slave_0 left promiscuous mode [ 1169.672623][T14669] bridge0: port 1(bridge_slave_0) entered disabled state [ 1170.515310][T14669] device hsr_slave_0 left promiscuous mode [ 1170.555055][T14669] device hsr_slave_1 left promiscuous mode [ 1170.623502][T14669] team0 (unregistering): Port device team_slave_1 removed [ 1170.634422][T14669] team0 (unregistering): Port device team_slave_0 removed [ 1170.645334][T14669] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1170.690101][T14669] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1170.771956][T14669] bond0 (unregistering): Released all slaves [ 1170.873905][T18479] IPVS: ftp: loaded support on port[0] = 21 [ 1170.938905][T18479] chnl_net:caif_netlink_parms(): no params data found [ 1170.971201][T18479] bridge0: port 1(bridge_slave_0) entered blocking state [ 1170.978442][T18479] bridge0: port 1(bridge_slave_0) entered disabled state [ 1170.986661][T18479] device bridge_slave_0 entered promiscuous mode [ 1170.994255][T18479] bridge0: port 2(bridge_slave_1) entered blocking state [ 1171.001396][T18479] bridge0: port 2(bridge_slave_1) entered disabled state [ 1171.009449][T18479] device bridge_slave_1 entered promiscuous mode [ 1171.077404][T18479] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1171.092416][T18479] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1171.119600][T18479] team0: Port device team_slave_0 added [ 1171.130730][T18479] team0: Port device team_slave_1 added [ 1171.208116][T18479] device hsr_slave_0 entered promiscuous mode [ 1171.246785][T18479] device hsr_slave_1 entered promiscuous mode [ 1171.318643][T18479] debugfs: Directory 'hsr0' with parent '/' already present! [ 1171.340085][T18479] bridge0: port 2(bridge_slave_1) entered blocking state [ 1171.347245][T18479] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1171.354524][T18479] bridge0: port 1(bridge_slave_0) entered blocking state [ 1171.361655][T18479] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1171.414019][T18479] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1171.435339][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1171.444159][ T2912] bridge0: port 1(bridge_slave_0) entered disabled state [ 1171.457118][ T2912] bridge0: port 2(bridge_slave_1) entered disabled state [ 1171.476377][T18479] 8021q: adding VLAN 0 to HW filter on device team0 [ 1171.489328][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1171.498259][ T4362] bridge0: port 1(bridge_slave_0) entered blocking state [ 1171.505468][ T4362] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1171.527957][ T4363] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1171.536897][ T4363] bridge0: port 2(bridge_slave_1) entered blocking state [ 1171.543999][ T4363] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1171.557954][ T4363] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1171.582061][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1171.594651][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1171.604303][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1171.617136][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1171.629353][T18479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1171.650733][T18479] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1172.022232][T18489] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1172.032732][T18489] CPU: 1 PID: 18489 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1172.040642][T18489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1172.050712][T18489] Call Trace: [ 1172.054034][T18489] dump_stack+0xf5/0x159 [ 1172.058370][T18489] dump_header+0xaa/0x449 [ 1172.062820][T18489] oom_kill_process.cold+0x10/0x15 [ 1172.067981][T18489] out_of_memory+0x231/0xa00 [ 1172.072562][T18489] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1172.078248][T18489] mem_cgroup_out_of_memory+0x128/0x150 [ 1172.083912][T18489] memory_max_write+0x17b/0x250 [ 1172.088762][T18489] cgroup_file_write+0x119/0x320 [ 1172.093696][T18489] ? high_work_func+0x30/0x30 [ 1172.098372][T18489] kernfs_fop_write+0x1f4/0x2e0 [ 1172.103211][T18489] ? cgroup_css.part.0+0x90/0x90 [ 1172.108464][T18489] __vfs_write+0x67/0xc0 [ 1172.112773][T18489] ? kernfs_seq_show+0xe0/0xe0 [ 1172.117530][T18489] vfs_write+0x18a/0x390 [ 1172.121770][T18489] ksys_write+0xd5/0x1b0 [ 1172.126100][T18489] __x64_sys_write+0x4c/0x60 [ 1172.130778][T18489] do_syscall_64+0xcc/0x370 [ 1172.135277][T18489] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1172.141187][T18489] RIP: 0033:0x459f39 [ 1172.145100][T18489] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1172.167989][T18489] RSP: 002b:00007fc1e69dcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1172.176462][T18489] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1172.184442][T18489] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 1172.192418][T18489] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1172.200445][T18489] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc1e69dd6d4 [ 1172.208449][T18489] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1172.220265][T18489] memory: usage 2612kB, limit 0kB, failcnt 960 [ 1172.226611][T18489] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1172.233542][T18489] Memory cgroup stats for /syz1: [ 1172.233890][T18489] anon 2183168 [ 1172.233890][T18489] file 65536 [ 1172.233890][T18489] kernel_stack 36864 [ 1172.233890][T18489] slab 196608 [ 1172.233890][T18489] sock 0 [ 1172.233890][T18489] shmem 0 [ 1172.233890][T18489] file_mapped 0 [ 1172.233890][T18489] file_dirty 0 [ 1172.233890][T18489] file_writeback 0 [ 1172.233890][T18489] anon_thp 2097152 [ 1172.233890][T18489] inactive_anon 135168 [ 1172.233890][T18489] active_anon 2183168 [ 1172.233890][T18489] inactive_file 0 [ 1172.233890][T18489] active_file 0 [ 1172.233890][T18489] unevictable 135168 [ 1172.233890][T18489] slab_reclaimable 135168 [ 1172.233890][T18489] slab_unreclaimable 61440 [ 1172.233890][T18489] pgfault 57783 [ 1172.233890][T18489] pgmajfault 0 [ 1172.233890][T18489] workingset_refault 0 [ 1172.233890][T18489] workingset_activate 0 [ 1172.233890][T18489] workingset_nodereclaim 0 [ 1172.233890][T18489] pgrefill 269 [ 1172.233890][T18489] pgscan 267 [ 1172.233890][T18489] pgsteal 33 [ 1172.233890][T18489] pgactivate 231 [ 1172.330828][T18489] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=18485,uid=0 [ 1172.347014][T18489] Memory cgroup out of memory: Killed process 18485 (syz-executor.1) total-vm:72852kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:147456kB oom_score_adj:1000 [ 1172.368287][ T1063] oom_reaper: reaped process 18485 (syz-executor.1), now anon-rss:0kB, file-rss:34864kB, shmem-rss:0kB 16:40:28 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:40:28 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:40:28 executing program 0: 16:40:28 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r10, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r2, 0x0, 0x0) 16:40:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:40:28 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1172.781516][T18479] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1172.818658][T18479] CPU: 1 PID: 18479 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1172.826608][T18479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1172.836728][T18479] Call Trace: [ 1172.840053][T18479] dump_stack+0xf5/0x159 [ 1172.844405][T18479] dump_header+0xaa/0x449 [ 1172.848773][T18479] oom_kill_process.cold+0x10/0x15 [ 1172.853917][T18479] out_of_memory+0x231/0xa00 [ 1172.858533][T18479] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1172.864254][T18479] mem_cgroup_out_of_memory+0x128/0x150 [ 1172.869839][T18479] try_charge+0xb3a/0xbc0 [ 1172.874195][T18479] ? rcu_note_context_switch+0x700/0x760 [ 1172.879862][T18479] mem_cgroup_try_charge+0xd2/0x260 [ 1172.885092][T18479] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1172.890758][T18479] wp_page_copy+0x322/0x1160 [ 1172.895376][T18479] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1172.901074][T18479] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1172.906838][T18479] do_wp_page+0x192/0x11f0 [ 1172.911277][T18479] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1172.916951][T18479] __handle_mm_fault+0x1c07/0x2cb0 [ 1172.922131][T18479] handle_mm_fault+0x21b/0x530 [ 1172.927058][T18479] __do_page_fault+0x3fb/0x9e0 [ 1172.931942][T18479] do_page_fault+0x54/0x233 [ 1172.936493][T18479] ? prepare_exit_to_usermode+0x154/0x1a0 [ 1172.942264][T18479] page_fault+0x34/0x40 [ 1172.946428][T18479] RIP: 0033:0x431016 [ 1172.950359][T18479] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 cc 5c 64 00 85 c0 0f 84 [ 1172.970167][T18479] RSP: 002b:00007ffcfcc66200 EFLAGS: 00010206 16:40:28 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:40:28 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:40:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) [ 1172.976593][T18479] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1172.984576][T18479] RDX: 00000000019d9930 RSI: 00000000019e1970 RDI: 0000000000000003 [ 1172.992561][T18479] RBP: 0000000000008041 R08: 0000000000000001 R09: 00000000019d8940 [ 1173.000554][T18479] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1173.008548][T18479] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 16:40:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:40:29 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:40:29 executing program 0: [ 1173.541968][T18479] memory: usage 248kB, limit 0kB, failcnt 979 [ 1173.560537][T18479] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1173.588477][T18479] Memory cgroup stats for /syz1: [ 1173.588741][T18479] anon 61440 [ 1173.588741][T18479] file 65536 [ 1173.588741][T18479] kernel_stack 36864 [ 1173.588741][T18479] slab 196608 [ 1173.588741][T18479] sock 0 [ 1173.588741][T18479] shmem 0 [ 1173.588741][T18479] file_mapped 0 [ 1173.588741][T18479] file_dirty 0 [ 1173.588741][T18479] file_writeback 0 [ 1173.588741][T18479] anon_thp 0 [ 1173.588741][T18479] inactive_anon 135168 [ 1173.588741][T18479] active_anon 61440 [ 1173.588741][T18479] inactive_file 0 [ 1173.588741][T18479] active_file 0 [ 1173.588741][T18479] unevictable 135168 [ 1173.588741][T18479] slab_reclaimable 135168 [ 1173.588741][T18479] slab_unreclaimable 61440 [ 1173.588741][T18479] pgfault 57849 [ 1173.588741][T18479] pgmajfault 0 [ 1173.588741][T18479] workingset_refault 0 [ 1173.588741][T18479] workingset_activate 0 [ 1173.588741][T18479] workingset_nodereclaim 0 [ 1173.588741][T18479] pgrefill 269 [ 1173.588741][T18479] pgscan 267 [ 1173.588741][T18479] pgsteal 33 [ 1173.588741][T18479] pgactivate 231 [ 1173.707546][T18479] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=18479,uid=0 [ 1173.723758][T18479] Memory cgroup out of memory: Killed process 18479 (syz-executor.1) total-vm:72456kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 [ 1173.743709][ T1063] oom_reaper: reaped process 18479 (syz-executor.1), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 16:40:29 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:40:29 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:40:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, 0x0, 0x0) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) [ 1174.935813][T14669] device bridge_slave_1 left promiscuous mode [ 1174.942054][T14669] bridge0: port 2(bridge_slave_1) entered disabled state [ 1174.995786][T14669] device bridge_slave_0 left promiscuous mode [ 1175.002057][T14669] bridge0: port 1(bridge_slave_0) entered disabled state [ 1175.835423][T14669] device hsr_slave_0 left promiscuous mode [ 1175.895086][T14669] device hsr_slave_1 left promiscuous mode [ 1175.963528][T14669] team0 (unregistering): Port device team_slave_1 removed [ 1175.974718][T14669] team0 (unregistering): Port device team_slave_0 removed [ 1175.985900][T14669] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1176.049237][T14669] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1176.131551][T14669] bond0 (unregistering): Released all slaves [ 1176.213553][T18524] IPVS: ftp: loaded support on port[0] = 21 [ 1176.276766][T18524] chnl_net:caif_netlink_parms(): no params data found [ 1176.311145][T18524] bridge0: port 1(bridge_slave_0) entered blocking state [ 1176.318360][T18524] bridge0: port 1(bridge_slave_0) entered disabled state [ 1176.326411][T18524] device bridge_slave_0 entered promiscuous mode [ 1176.334010][T18524] bridge0: port 2(bridge_slave_1) entered blocking state [ 1176.341238][T18524] bridge0: port 2(bridge_slave_1) entered disabled state [ 1176.349282][T18524] device bridge_slave_1 entered promiscuous mode [ 1176.421254][T18524] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1176.433076][T18524] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1176.456715][T18524] team0: Port device team_slave_0 added [ 1176.463835][T18524] team0: Port device team_slave_1 added [ 1176.538112][T18524] device hsr_slave_0 entered promiscuous mode [ 1176.589079][T18524] device hsr_slave_1 entered promiscuous mode [ 1176.634975][T18524] debugfs: Directory 'hsr0' with parent '/' already present! [ 1176.657146][T18524] bridge0: port 2(bridge_slave_1) entered blocking state [ 1176.664271][T18524] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1176.671785][T18524] bridge0: port 1(bridge_slave_0) entered blocking state [ 1176.678853][T18524] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1176.733312][T18524] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1176.753112][ T4363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1176.762214][ T4363] bridge0: port 1(bridge_slave_0) entered disabled state [ 1176.775594][ T4363] bridge0: port 2(bridge_slave_1) entered disabled state [ 1176.795619][T18524] 8021q: adding VLAN 0 to HW filter on device team0 [ 1176.808349][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1176.817446][ T4362] bridge0: port 1(bridge_slave_0) entered blocking state [ 1176.824483][ T4362] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1176.852166][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1176.861164][ T2912] bridge0: port 2(bridge_slave_1) entered blocking state [ 1176.868264][ T2912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1176.883353][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1176.907060][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1176.920293][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1176.929546][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1176.944184][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1176.955197][T18524] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1176.980567][T18524] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1177.365454][T18534] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1177.375899][T18534] CPU: 0 PID: 18534 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1177.383805][T18534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1177.393897][T18534] Call Trace: [ 1177.397267][T18534] dump_stack+0xf5/0x159 [ 1177.401528][T18534] dump_header+0xaa/0x449 [ 1177.405930][T18534] oom_kill_process.cold+0x10/0x15 [ 1177.411163][T18534] out_of_memory+0x231/0xa00 [ 1177.415839][T18534] ? preempt_schedule_common+0x37/0x90 [ 1177.421316][T18534] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1177.427062][T18534] mem_cgroup_out_of_memory+0x128/0x150 [ 1177.432751][T18534] memory_max_write+0x17b/0x250 [ 1177.437639][T18534] cgroup_file_write+0x119/0x320 [ 1177.442692][T18534] ? high_work_func+0x30/0x30 [ 1177.447440][T18534] kernfs_fop_write+0x1f4/0x2e0 [ 1177.452318][T18534] ? cgroup_css.part.0+0x90/0x90 [ 1177.457633][T18534] __vfs_write+0x67/0xc0 [ 1177.462000][T18534] ? kernfs_seq_show+0xe0/0xe0 [ 1177.466784][T18534] vfs_write+0x18a/0x390 [ 1177.471065][T18534] ksys_write+0xd5/0x1b0 [ 1177.475453][T18534] __x64_sys_write+0x4c/0x60 [ 1177.480069][T18534] do_syscall_64+0xcc/0x370 [ 1177.484638][T18534] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1177.490719][T18534] RIP: 0033:0x459f39 [ 1177.494705][T18534] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1177.514333][T18534] RSP: 002b:00007efe46b64c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1177.522732][T18534] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1177.530696][T18534] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 1177.538658][T18534] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1177.546679][T18534] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efe46b656d4 [ 1177.554648][T18534] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1177.562973][T18534] memory: usage 4660kB, limit 0kB, failcnt 923 [ 1177.569200][T18534] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1177.576105][T18534] Memory cgroup stats for /syz3: [ 1177.576404][T18534] anon 4333568 [ 1177.576404][T18534] file 45056 [ 1177.576404][T18534] kernel_stack 36864 [ 1177.576404][T18534] slab 143360 [ 1177.576404][T18534] sock 0 [ 1177.576404][T18534] shmem 0 [ 1177.576404][T18534] file_mapped 0 [ 1177.576404][T18534] file_dirty 135168 [ 1177.576404][T18534] file_writeback 0 [ 1177.576404][T18534] anon_thp 4194304 [ 1177.576404][T18534] inactive_anon 0 [ 1177.576404][T18534] active_anon 4333568 [ 1177.576404][T18534] inactive_file 135168 [ 1177.576404][T18534] active_file 135168 [ 1177.576404][T18534] unevictable 135168 [ 1177.576404][T18534] slab_reclaimable 135168 [ 1177.576404][T18534] slab_unreclaimable 8192 [ 1177.576404][T18534] pgfault 53922 [ 1177.576404][T18534] pgmajfault 0 [ 1177.576404][T18534] workingset_refault 0 [ 1177.576404][T18534] workingset_activate 0 [ 1177.576404][T18534] workingset_nodereclaim 0 [ 1177.576404][T18534] pgrefill 198 [ 1177.576404][T18534] pgscan 198 [ 1177.576404][T18534] pgsteal 0 [ 1177.576404][T18534] pgactivate 198 [ 1177.672999][T18534] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=18530,uid=0 [ 1177.688681][T18534] Memory cgroup out of memory: Killed process 18530 (syz-executor.3) total-vm:72852kB, anon-rss:4192kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:151552kB oom_score_adj:1000 [ 1177.709026][ T1063] oom_reaper: reaped process 18530 (syz-executor.3), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB 16:40:34 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:40:34 executing program 0: 16:40:34 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:40:34 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:40:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, 0x0, 0x0) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:40:34 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1178.352772][T18524] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1178.405107][T18524] CPU: 0 PID: 18524 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1178.413131][T18524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1178.423207][T18524] Call Trace: [ 1178.426528][T18524] dump_stack+0xf5/0x159 [ 1178.430889][T18524] dump_header+0xaa/0x449 [ 1178.435273][T18524] oom_kill_process.cold+0x10/0x15 [ 1178.440442][T18524] out_of_memory+0x231/0xa00 [ 1178.445062][T18524] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1178.450788][T18524] mem_cgroup_out_of_memory+0x128/0x150 [ 1178.456473][T18524] try_charge+0xb3a/0xbc0 [ 1178.460833][T18524] ? rcu_note_context_switch+0x700/0x760 [ 1178.466517][T18524] mem_cgroup_try_charge+0xd2/0x260 [ 1178.471832][T18524] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1178.477553][T18524] wp_page_copy+0x322/0x1160 [ 1178.482166][T18524] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1178.487834][T18524] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1178.493522][T18524] do_wp_page+0x192/0x11f0 [ 1178.498002][T18524] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1178.503737][T18524] __handle_mm_fault+0x1c07/0x2cb0 [ 1178.508970][T18524] handle_mm_fault+0x21b/0x530 [ 1178.513793][T18524] __do_page_fault+0x3fb/0x9e0 [ 1178.518629][T18524] do_page_fault+0x54/0x233 [ 1178.523176][T18524] ? prepare_exit_to_usermode+0x154/0x1a0 [ 1178.529009][T18524] page_fault+0x34/0x40 [ 1178.533295][T18524] RIP: 0033:0x431016 16:40:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, 0x0, 0x0) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) [ 1178.537250][T18524] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 cc 5c 64 00 85 c0 0f 84 [ 1178.557072][T18524] RSP: 002b:00007ffd5a16e350 EFLAGS: 00010206 [ 1178.563182][T18524] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1178.571187][T18524] RDX: 0000000002389930 RSI: 0000000002391970 RDI: 0000000000000003 [ 1178.579184][T18524] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002388940 [ 1178.587283][T18524] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1178.595283][T18524] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 16:40:34 executing program 0: 16:40:34 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:40:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:40:34 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:40:34 executing program 0: r0 = getpgrp(0x0) r1 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, 0x0) [ 1178.955111][T18524] memory: usage 244kB, limit 0kB, failcnt 936 [ 1178.964946][T18524] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1178.994365][T18524] Memory cgroup stats for /syz3: [ 1178.994636][T18524] anon 57344 [ 1178.994636][T18524] file 45056 [ 1178.994636][T18524] kernel_stack 36864 [ 1178.994636][T18524] slab 143360 [ 1178.994636][T18524] sock 0 [ 1178.994636][T18524] shmem 0 [ 1178.994636][T18524] file_mapped 0 [ 1178.994636][T18524] file_dirty 135168 [ 1178.994636][T18524] file_writeback 0 [ 1178.994636][T18524] anon_thp 0 [ 1178.994636][T18524] inactive_anon 0 [ 1178.994636][T18524] active_anon 57344 [ 1178.994636][T18524] inactive_file 135168 [ 1178.994636][T18524] active_file 135168 [ 1178.994636][T18524] unevictable 135168 [ 1178.994636][T18524] slab_reclaimable 135168 [ 1178.994636][T18524] slab_unreclaimable 8192 [ 1178.994636][T18524] pgfault 53922 [ 1178.994636][T18524] pgmajfault 0 [ 1178.994636][T18524] workingset_refault 0 [ 1178.994636][T18524] workingset_activate 0 [ 1178.994636][T18524] workingset_nodereclaim 0 [ 1178.994636][T18524] pgrefill 198 [ 1178.994636][T18524] pgscan 198 [ 1178.994636][T18524] pgsteal 0 [ 1178.994636][T18524] pgactivate 198 [ 1179.394964][T18524] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=18524,uid=0 [ 1179.438822][T18524] Memory cgroup out of memory: Killed process 18524 (syz-executor.3) total-vm:72456kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 [ 1179.472064][ T1063] oom_reaper: reaped process 18524 (syz-executor.3), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 16:40:35 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:40:35 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x89b1, &(0x7f0000000100)={@empty, @ipv4={[], [], @multicast2}, @mcast2}) 16:40:35 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0b01000408000000000000000000000000000000000000000800000000000000bb1153e6af9cd7b1ef65fac3b3cd6cd20a1f269ccf05c41692a6709b20dfa865407fde32a87a282c299f70e0bd50cb4809000000d0f3970729929dd758d941915b47c2a9b73e8e70be31d660c625ae235530ccd390b9a0a333cf2ef7330be96ab7e6db31afb0b44ced47bc6a91f8dc81c601000000000000007484b2724c4f472e0357f9fa7deddfb628e52a1b3ec279b2382305931d830c3c0027b5c47858fb16a20989c5bb0821bb7ef7a8cb6d2efe331705bb1d227376e06ac6cad52d2c30b173f738d65ca7cc9f890186d8701b975c9cb30e545b311628ee22b2c799bc3fb9c79f681f119d39f4cd37c3500c694ccf0000000000009029bb1618801b3f3c000000004e8e8bc665a987f44bf6a7f0728b662a05cca657aa6382b8fcc6672c550f660c5c371bd836b4042ea3d4def643a5ab3f17cd0000000000000000000000000000000000000000000000000000000000e6cc9c00000000000000000000000000001300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bf19e066d12850f00bda2ab100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ea0b37f52ec4ed91870f4b8940a9bddbe941420c855f3fbe63a05250fd13ec07c327c47cba0303f426054d157cee8387a44b9d278ff41713d4d8987c953aa6ded91b7bd6d6a393"], 0x51b) [ 1180.525672][T23226] device bridge_slave_1 left promiscuous mode [ 1180.531917][T23226] bridge0: port 2(bridge_slave_1) entered disabled state [ 1180.585721][T23226] device bridge_slave_0 left promiscuous mode [ 1180.591989][T23226] bridge0: port 1(bridge_slave_0) entered disabled state [ 1181.405509][T23226] device hsr_slave_0 left promiscuous mode [ 1181.454995][T23226] device hsr_slave_1 left promiscuous mode [ 1181.542350][T23226] team0 (unregistering): Port device team_slave_1 removed [ 1181.554204][T23226] team0 (unregistering): Port device team_slave_0 removed [ 1181.564873][T23226] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1181.618979][T23226] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1181.720695][T23226] bond0 (unregistering): Released all slaves [ 1181.824038][T18575] IPVS: ftp: loaded support on port[0] = 21 [ 1181.886638][T18575] chnl_net:caif_netlink_parms(): no params data found [ 1181.980710][T18575] bridge0: port 1(bridge_slave_0) entered blocking state [ 1181.988643][T18575] bridge0: port 1(bridge_slave_0) entered disabled state [ 1182.000240][T18575] device bridge_slave_0 entered promiscuous mode [ 1182.009217][T18575] bridge0: port 2(bridge_slave_1) entered blocking state [ 1182.019642][T18575] bridge0: port 2(bridge_slave_1) entered disabled state [ 1182.028843][T18575] device bridge_slave_1 entered promiscuous mode [ 1182.058684][T18575] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1182.070753][T18575] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1182.101719][T18575] team0: Port device team_slave_0 added [ 1182.109585][T18575] team0: Port device team_slave_1 added [ 1182.171235][T18575] device hsr_slave_0 entered promiscuous mode [ 1182.215366][T18575] device hsr_slave_1 entered promiscuous mode [ 1182.284946][T18575] debugfs: Directory 'hsr0' with parent '/' already present! [ 1182.305573][T18575] bridge0: port 2(bridge_slave_1) entered blocking state [ 1182.312661][T18575] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1182.320013][T18575] bridge0: port 1(bridge_slave_0) entered blocking state [ 1182.327123][T18575] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1182.380306][T18575] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1182.394309][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1182.408034][ T4358] bridge0: port 1(bridge_slave_0) entered disabled state [ 1182.419067][ T4358] bridge0: port 2(bridge_slave_1) entered disabled state [ 1182.435825][T18575] 8021q: adding VLAN 0 to HW filter on device team0 [ 1182.448472][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1182.457601][ T2222] bridge0: port 1(bridge_slave_0) entered blocking state [ 1182.464656][ T2222] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1182.490544][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1182.499499][ T3501] bridge0: port 2(bridge_slave_1) entered blocking state [ 1182.506560][ T3501] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1182.526756][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1182.536479][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1182.546343][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1182.558641][T18575] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1182.570210][T18575] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1182.578558][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1182.587072][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1182.606109][T18575] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1183.014834][T18585] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1183.025361][T18585] CPU: 0 PID: 18585 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1183.033271][T18585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1183.043371][T18585] Call Trace: [ 1183.046696][T18585] dump_stack+0xf5/0x159 [ 1183.051011][T18585] dump_header+0xaa/0x449 [ 1183.055402][T18585] oom_kill_process.cold+0x10/0x15 [ 1183.060575][T18585] out_of_memory+0x231/0xa00 [ 1183.065180][T18585] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1183.070805][T18585] ? timer_reduce+0xa4/0x830 [ 1183.075383][T18585] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1183.081081][T18585] mem_cgroup_out_of_memory+0x128/0x150 [ 1183.086665][T18585] memory_max_write+0x17b/0x250 [ 1183.091624][T18585] cgroup_file_write+0x119/0x320 [ 1183.096568][T18585] ? high_work_func+0x30/0x30 [ 1183.101417][T18585] kernfs_fop_write+0x1f4/0x2e0 [ 1183.106330][T18585] ? cgroup_css.part.0+0x90/0x90 [ 1183.111293][T18585] __vfs_write+0x67/0xc0 [ 1183.115598][T18585] ? kernfs_seq_show+0xe0/0xe0 [ 1183.120392][T18585] vfs_write+0x18a/0x390 [ 1183.124630][T18585] ksys_write+0xd5/0x1b0 [ 1183.128928][T18585] __x64_sys_write+0x4c/0x60 [ 1183.133513][T18585] do_syscall_64+0xcc/0x370 [ 1183.138009][T18585] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1183.143952][T18585] RIP: 0033:0x459f39 [ 1183.147845][T18585] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1183.167645][T18585] RSP: 002b:00007ff7c9660c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1183.176131][T18585] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1183.184176][T18585] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 1183.192217][T18585] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1183.200178][T18585] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff7c96616d4 [ 1183.209146][T18585] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1183.218278][T18585] memory: usage 2612kB, limit 0kB, failcnt 988 [ 1183.224769][T18585] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1183.232034][T18585] Memory cgroup stats for /syz1: [ 1183.232312][T18585] anon 2174976 [ 1183.232312][T18585] file 65536 [ 1183.232312][T18585] kernel_stack 36864 [ 1183.232312][T18585] slab 331776 [ 1183.232312][T18585] sock 0 [ 1183.232312][T18585] shmem 0 [ 1183.232312][T18585] file_mapped 0 [ 1183.232312][T18585] file_dirty 0 [ 1183.232312][T18585] file_writeback 0 [ 1183.232312][T18585] anon_thp 2097152 [ 1183.232312][T18585] inactive_anon 135168 [ 1183.232312][T18585] active_anon 2174976 [ 1183.232312][T18585] inactive_file 0 [ 1183.232312][T18585] active_file 0 [ 1183.232312][T18585] unevictable 135168 [ 1183.232312][T18585] slab_reclaimable 135168 [ 1183.232312][T18585] slab_unreclaimable 196608 [ 1183.232312][T18585] pgfault 57915 [ 1183.232312][T18585] pgmajfault 0 [ 1183.232312][T18585] workingset_refault 0 [ 1183.232312][T18585] workingset_activate 0 [ 1183.232312][T18585] workingset_nodereclaim 0 [ 1183.232312][T18585] pgrefill 269 [ 1183.232312][T18585] pgscan 267 [ 1183.232312][T18585] pgsteal 33 [ 1183.232312][T18585] pgactivate 231 [ 1183.330590][T18585] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=18582,uid=0 [ 1183.346249][T18585] Memory cgroup out of memory: Killed process 18582 (syz-executor.1) total-vm:72852kB, anon-rss:2148kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:147456kB oom_score_adj:1000 [ 1183.366309][ T1063] oom_reaper: reaped process 18582 (syz-executor.1), now anon-rss:0kB, file-rss:34860kB, shmem-rss:0kB 16:40:39 executing program 1: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:40:39 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000280008001c000100000000000000000000000000000000000010000002000000080002000000020008000100726564001c01020004010200b205a34f0459cc6abb699f4e08e3b1b5f75780560a59a8480dae55818041c02d8471389f5a076eaa787f8246aef232f41fb4fd095e664069035a011afb427b4799dc17338322cbd91968a88f2fbcbba734486e4d3c392ec5c40433021f006b4ddf02645062bacedcbcd61e4be8eea0e577dae0a23161a078fbdf38770e055341db2eca0ca565e8c92336422a57f6adad6ed581b27ccc9155e93c542353f1681423161cb1e44cc5b75a30515c051d3a8f0d2bcb9e9ebfa6290dd5fd8cd5150410922c3f86a3cee1d9e807ad3428f51c99eb16018bf7a6cd83dca6ff4af8a94fab0a1d86fded7a3835a987bd9f53499def9115ff45ce9d94aa0000000000000000140001000700000000000000000000000000000090755b1181d8ac64ad6e566b7b257541d4d4724304aa7f09742cb7aa1356d8a6ad0ffb6f29159b620809292345aed62b298e22129645d2c2df3a1049bb8561dc4bcf376aa1e40955892f428fef7bf7a683ebf60e73b5375d99d503b76a2eafe39c6e07a7ff905b71f6e41a8be26c62eb3d2530d15a1ab1d9ade93c7871a16f73894c05b9160fb84864e78c5ad2b627edd0d0393f66909ed0110ce53e3466384674a182dc5cf9e641af3ed8ad5f73c2061aef4a4f65c9ae577e81bff9f24354d65f4d1e7a5cf357bf520c903a35d6b21ca60a8728f6c2374d6070950331a750ce506b7fb85105121bba272f13b7e7692a525cf9855f6225739c944d37d257b902533ee7569e5d5df9c4673cdcaafaa26a75d5991552519f450044"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:40:39 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) [ 1183.960143][T18575] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1183.970640][T18575] CPU: 1 PID: 18575 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1183.978587][T18575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1183.988656][T18575] Call Trace: [ 1183.992000][T18575] dump_stack+0xf5/0x159 [ 1183.996279][T18575] dump_header+0xaa/0x449 [ 1184.000753][T18575] oom_kill_process.cold+0x10/0x15 [ 1184.005928][T18575] out_of_memory+0x231/0xa00 [ 1184.010585][T18575] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1184.016275][T18575] mem_cgroup_out_of_memory+0x128/0x150 [ 1184.021865][T18575] try_charge+0xb3a/0xbc0 [ 1184.026249][T18575] ? rcu_note_context_switch+0x700/0x760 [ 1184.031936][T18575] mem_cgroup_try_charge+0xd2/0x260 [ 1184.037214][T18575] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1184.042883][T18575] wp_page_copy+0x322/0x1160 [ 1184.047533][T18575] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1184.053212][T18575] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1184.058902][T18575] do_wp_page+0x192/0x11f0 [ 1184.063340][T18575] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1184.069065][T18575] __handle_mm_fault+0x1c07/0x2cb0 [ 1184.074222][T18575] handle_mm_fault+0x21b/0x530 [ 1184.079019][T18575] __do_page_fault+0x3fb/0x9e0 [ 1184.083899][T18575] do_page_fault+0x54/0x233 [ 1184.088436][T18575] ? prepare_exit_to_usermode+0x154/0x1a0 [ 1184.094179][T18575] page_fault+0x34/0x40 [ 1184.098350][T18575] RIP: 0033:0x431016 [ 1184.102281][T18575] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 cc 5c 64 00 85 c0 0f 84 [ 1184.121939][T18575] RSP: 002b:00007fffb98cea40 EFLAGS: 00010206 [ 1184.128027][T18575] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1184.136054][T18575] RDX: 0000000000f42930 RSI: 0000000000f4a970 RDI: 0000000000000003 [ 1184.144135][T18575] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000000f41940 [ 1184.152199][T18575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 16:40:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:40:39 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:40:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000280)=0xff, 0x4) sendmmsg(r0, &(0x7f0000000000), 0x24a, 0x0) 16:40:40 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000280008001c000100000000000000000000000000000000000010000002000000080002000000020008000100726564001c01020004010200b205a34f0459cc6abb699f4e08e3b1b5f75780560a59a8480dae55818041c02d8471389f5a076eaa787f8246aef232f41fb4fd095e664069035a011afb427b4799dc17338322cbd91968a88f2fbcbba734486e4d3c392ec5c40433021f006b4ddf02645062bacedcbcd61e4be8eea0e577dae0a23161a078fbdf38770e055341db2eca0ca565e8c92336422a57f6adad6ed581b27ccc9155e93c542353f1681423161cb1e44cc5b75a30515c051d3a8f0d2bcb9e9ebfa6290dd5fd8cd5150410922c3f86a3cee1d9e807ad3428f51c99eb16018bf7a6cd83dca6ff4af8a94fab0a1d86fded7a3835a987bd9f53499def9115ff45ce9d94aa0000000000000000140001000700000000000000000000000000000090755b1181d8ac64ad6e566b7b257541d4d4724304aa7f09742cb7aa1356d8a6ad0ffb6f29159b620809292345aed62b298e22129645d2c2df3a1049bb8561dc4bcf376aa1e40955892f428fef7bf7a683ebf60e73b5375d99d503b76a2eafe39c6e07a7ff905b71f6e41a8be26c62eb3d2530d15a1ab1d9ade93c7871a16f73894c05b9160fb84864e78c5ad2b627edd0d0393f66909ed0110ce53e3466384674a182dc5cf9e641af3ed8ad5f73c2061aef4a4f65c9ae577e81bff9f24354d65f4d1e7a5cf357bf520c903a35d6b21ca60a8728f6c2374d6070950331a750ce506b7fb85105121bba272f13b7e7692a525cf9855f6225739c944d37d257b902533ee7569e5d5df9c4673cdcaafaa26a75d5991552519f450044"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1184.160296][T18575] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 [ 1184.192633][T18575] memory: usage 252kB, limit 0kB, failcnt 1001 [ 1184.215127][T18575] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1184.222032][T18575] Memory cgroup stats for /syz1: [ 1184.222274][T18575] anon 20480 [ 1184.222274][T18575] file 65536 [ 1184.222274][T18575] kernel_stack 0 [ 1184.222274][T18575] slab 331776 [ 1184.222274][T18575] sock 0 [ 1184.222274][T18575] shmem 0 [ 1184.222274][T18575] file_mapped 0 [ 1184.222274][T18575] file_dirty 0 [ 1184.222274][T18575] file_writeback 0 [ 1184.222274][T18575] anon_thp 0 [ 1184.222274][T18575] inactive_anon 135168 [ 1184.222274][T18575] active_anon 20480 [ 1184.222274][T18575] inactive_file 0 [ 1184.222274][T18575] active_file 0 [ 1184.222274][T18575] unevictable 135168 [ 1184.222274][T18575] slab_reclaimable 135168 [ 1184.222274][T18575] slab_unreclaimable 196608 [ 1184.222274][T18575] pgfault 57915 [ 1184.222274][T18575] pgmajfault 0 [ 1184.222274][T18575] workingset_refault 0 [ 1184.222274][T18575] workingset_activate 0 [ 1184.222274][T18575] workingset_nodereclaim 0 [ 1184.222274][T18575] pgrefill 269 [ 1184.222274][T18575] pgscan 267 [ 1184.222274][T18575] pgsteal 33 16:40:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) [ 1184.222274][T18575] pgactivate 231 16:40:40 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) 16:40:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000280)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000fee000/0x12000)=nil, &(0x7f0000000240)="db29fb", 0x3}, 0x68) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1184.399008][T18575] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=18575,uid=0 [ 1184.498940][T18575] Memory cgroup out of memory: Killed process 18575 (syz-executor.1) total-vm:72456kB, anon-rss:76kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 16:40:40 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:40:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x0, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:40:41 executing program 1: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:40:41 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="0b01000408000000000000000000000000000000000000000800000000000000bb1153e6af9cd7b1ef65fac3b3cd6cd20a1f269ccf05c41692a6709b20dfa865407fde32a87a282c299f70e0bd50cb4809000000d0f3970729929dd758d941915b47c2a9b73e8e70be31d660c625ae235530ccd390b9a0a333cf2ef7330be96ab7e6db31afb0b44ced47bc6a91f8dc81c601000000000000007484b2724c4f472e0357f9fa7deddfb628e52a1b3ec279b2382305931d830c3c0027b5c47858fb16a20989c5bb0821bb7ef7a8cb6d2efe331705bb1d227376e06ac6cad52d2c30b173f738d65ca7cc9f890186d8701b975c9cb30e545b311628ee22b2c799bc3fb9c79f681f119d39f4cd37c3500c694ccf0000000000009029bb1618801b3f3c000000004e8e8bc665a987f44bf6a7f0728b662a05cca657aa6382b8fcc6672c550f660c5c371bd836b4042ea3d4def643a5ab3f17cd0000000000000000000000000000000000000000000000000000000000e6cc9c00000000000000000000000000001300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bf19e066d12850f00bda2ab100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ea0b37f52ec4ed91870f4b8940a9bddbe941420c855f3fbe63a05250fd13ec07c327c47cba0303f426054d157cee8387a44b9d278ff41713d4d8987c953aa6ded91b7bd6d6a393"], 0x51b) [ 1186.315888][T14660] device bridge_slave_1 left promiscuous mode [ 1186.322215][T14660] bridge0: port 2(bridge_slave_1) entered disabled state [ 1186.375808][T14660] device bridge_slave_0 left promiscuous mode [ 1186.382096][T14660] bridge0: port 1(bridge_slave_0) entered disabled state [ 1187.215310][T14660] device hsr_slave_0 left promiscuous mode [ 1187.305215][T14660] device hsr_slave_1 left promiscuous mode [ 1187.382372][T14660] team0 (unregistering): Port device team_slave_1 removed [ 1187.393171][T14660] team0 (unregistering): Port device team_slave_0 removed [ 1187.404146][T14660] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1187.448704][T14660] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1187.530643][T14660] bond0 (unregistering): Released all slaves [ 1187.633827][T18627] IPVS: ftp: loaded support on port[0] = 21 [ 1187.700858][T18627] chnl_net:caif_netlink_parms(): no params data found [ 1187.733529][T18627] bridge0: port 1(bridge_slave_0) entered blocking state [ 1187.740761][T18627] bridge0: port 1(bridge_slave_0) entered disabled state [ 1187.749270][T18627] device bridge_slave_0 entered promiscuous mode [ 1187.757066][T18627] bridge0: port 2(bridge_slave_1) entered blocking state [ 1187.764227][T18627] bridge0: port 2(bridge_slave_1) entered disabled state [ 1187.772245][T18627] device bridge_slave_1 entered promiscuous mode [ 1187.793147][T18627] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1187.870542][T18627] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1187.894602][T18627] team0: Port device team_slave_0 added [ 1187.901755][T18627] team0: Port device team_slave_1 added [ 1187.973718][T18627] device hsr_slave_0 entered promiscuous mode [ 1188.015360][T18627] device hsr_slave_1 entered promiscuous mode [ 1188.068645][T18627] debugfs: Directory 'hsr0' with parent '/' already present! [ 1188.089036][T18627] bridge0: port 2(bridge_slave_1) entered blocking state [ 1188.096183][T18627] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1188.103518][T18627] bridge0: port 1(bridge_slave_0) entered blocking state [ 1188.110861][T18627] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1188.162635][T18627] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1188.181774][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1188.190755][ T3501] bridge0: port 1(bridge_slave_0) entered disabled state [ 1188.204131][ T3501] bridge0: port 2(bridge_slave_1) entered disabled state [ 1188.224047][T18627] 8021q: adding VLAN 0 to HW filter on device team0 [ 1188.241096][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1188.250113][ T3501] bridge0: port 1(bridge_slave_0) entered blocking state [ 1188.257267][ T3501] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1188.280705][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1188.292998][ T4358] bridge0: port 2(bridge_slave_1) entered blocking state [ 1188.300087][ T4358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1188.330907][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1188.340396][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1188.354299][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1188.363456][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1188.377944][T18627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1188.390503][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1188.416365][T18627] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1188.703666][T18635] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1188.714218][T18635] CPU: 1 PID: 18635 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1188.722138][T18635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1188.732226][T18635] Call Trace: [ 1188.735536][T18635] dump_stack+0xf5/0x159 [ 1188.739785][T18635] dump_header+0xaa/0x449 [ 1188.744116][T18635] oom_kill_process.cold+0x10/0x15 [ 1188.749221][T18635] out_of_memory+0x231/0xa00 [ 1188.753802][T18635] ? preempt_schedule_common+0x37/0x90 [ 1188.759280][T18635] mem_cgroup_out_of_memory+0x128/0x150 [ 1188.764824][T18635] memory_max_write+0x17b/0x250 [ 1188.769743][T18635] cgroup_file_write+0x119/0x320 [ 1188.774694][T18635] ? high_work_func+0x30/0x30 [ 1188.779375][T18635] kernfs_fop_write+0x1f4/0x2e0 [ 1188.784218][T18635] ? cgroup_css.part.0+0x90/0x90 [ 1188.789160][T18635] __vfs_write+0x67/0xc0 [ 1188.793394][T18635] ? kernfs_seq_show+0xe0/0xe0 [ 1188.798150][T18635] vfs_write+0x18a/0x390 [ 1188.802431][T18635] ksys_write+0xd5/0x1b0 [ 1188.806672][T18635] __x64_sys_write+0x4c/0x60 [ 1188.811276][T18635] do_syscall_64+0xcc/0x370 [ 1188.815789][T18635] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1188.821680][T18635] RIP: 0033:0x459f39 [ 1188.825594][T18635] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1188.845216][T18635] RSP: 002b:00007f5345778c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1188.854387][T18635] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1188.862795][T18635] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009 [ 1188.870783][T18635] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1188.878759][T18635] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f53457796d4 [ 1188.886719][T18635] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1188.896703][T18635] memory: usage 4600kB, limit 0kB, failcnt 937 [ 1188.903054][T18635] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1188.911516][T18635] Memory cgroup stats for /syz3: [ 1188.913032][T18635] anon 4317184 [ 1188.913032][T18635] file 45056 [ 1188.913032][T18635] kernel_stack 36864 [ 1188.913032][T18635] slab 278528 [ 1188.913032][T18635] sock 0 [ 1188.913032][T18635] shmem 0 [ 1188.913032][T18635] file_mapped 0 [ 1188.913032][T18635] file_dirty 135168 [ 1188.913032][T18635] file_writeback 0 [ 1188.913032][T18635] anon_thp 4194304 [ 1188.913032][T18635] inactive_anon 0 [ 1188.913032][T18635] active_anon 4317184 [ 1188.913032][T18635] inactive_file 135168 [ 1188.913032][T18635] active_file 135168 [ 1188.913032][T18635] unevictable 135168 [ 1188.913032][T18635] slab_reclaimable 135168 [ 1188.913032][T18635] slab_unreclaimable 143360 [ 1188.913032][T18635] pgfault 53955 [ 1188.913032][T18635] pgmajfault 0 [ 1188.913032][T18635] workingset_refault 0 [ 1188.913032][T18635] workingset_activate 0 [ 1188.913032][T18635] workingset_nodereclaim 0 [ 1188.913032][T18635] pgrefill 198 [ 1188.913032][T18635] pgscan 198 [ 1188.913032][T18635] pgsteal 0 [ 1188.913032][T18635] pgactivate 198 [ 1189.014130][T18635] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=18633,uid=0 [ 1189.030713][T18635] Memory cgroup out of memory: Killed process 18633 (syz-executor.3) total-vm:72588kB, anon-rss:4192kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 1189.053283][ T1063] oom_reaper: reaped process 18633 (syz-executor.3), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB 16:40:45 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:40:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x0, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:40:45 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) mq_open(&(0x7f00000007c0)='.+\x00', 0x0, 0x0, 0x0) 16:40:45 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000280008001c000100000000000000000000000000000000000010000002000000080002000000020008000100726564001c01020004010200b205a34f0459cc6abb699f4e08e3b1b5f75780560a59a8480dae55818041c02d8471389f5a076eaa787f8246aef232f41fb4fd095e664069035a011afb427b4799dc17338322cbd91968a88f2fbcbba734486e4d3c392ec5c40433021f006b4ddf02645062bacedcbcd61e4be8eea0e577dae0a23161a078fbdf38770e055341db2eca0ca565e8c92336422a57f6adad6ed581b27ccc9155e93c542353f1681423161cb1e44cc5b75a30515c051d3a8f0d2bcb9e9ebfa6290dd5fd8cd5150410922c3f86a3cee1d9e807ad3428f51c99eb16018bf7a6cd83dca6ff4af8a94fab0a1d86fded7a3835a987bd9f53499def9115ff45ce9d94aa0000000000000000140001000700000000000000000000000000000090755b1181d8ac64ad6e566b7b257541d4d4724304aa7f09742cb7aa1356d8a6ad0ffb6f29159b620809292345aed62b298e22129645d2c2df3a1049bb8561dc4bcf376aa1e40955892f428fef7bf7a683ebf60e73b5375d99d503b76a2eafe39c6e07a7ff905b71f6e41a8be26c62eb3d2530d15a1ab1d9ade93c7871a16f73894c05b9160fb84864e78c5ad2b627edd0d0393f66909ed0110ce53e3466384674a182dc5cf9e641af3ed8ad5f73c2061aef4a4f65c9ae577e81bff9f24354d65f4d1e7a5cf357bf520c903a35d6b21ca60a8728f6c2374d6070950331a750ce506b7fb85105121bba272f13b7e7692a525cf9855f6225739c944d37d257b902533ee7569e5d5df9c4673cdcaafaa26a75d5991552519f4500448ff3c95bef"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:40:45 executing program 1: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:40:45 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x51b) [ 1189.464719][T18627] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1189.519644][T18627] CPU: 0 PID: 18627 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1189.527652][T18627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1189.537721][T18627] Call Trace: [ 1189.541107][T18627] dump_stack+0xf5/0x159 [ 1189.545447][T18627] dump_header+0xaa/0x449 [ 1189.549819][T18627] oom_kill_process.cold+0x10/0x15 [ 1189.554982][T18627] out_of_memory+0x231/0xa00 [ 1189.559602][T18627] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1189.565366][T18627] mem_cgroup_out_of_memory+0x128/0x150 [ 1189.570984][T18627] try_charge+0xb3a/0xbc0 [ 1189.575445][T18627] ? rcu_note_context_switch+0x700/0x760 [ 1189.581133][T18627] mem_cgroup_try_charge+0xd2/0x260 [ 1189.586379][T18627] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1189.592064][T18627] wp_page_copy+0x322/0x1160 [ 1189.596700][T18627] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1189.602448][T18627] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1189.608192][T18627] do_wp_page+0x192/0x11f0 [ 1189.612638][T18627] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1189.618317][T18627] __handle_mm_fault+0x1c07/0x2cb0 [ 1189.623486][T18627] handle_mm_fault+0x21b/0x530 [ 1189.628341][T18627] __do_page_fault+0x3fb/0x9e0 [ 1189.633157][T18627] do_page_fault+0x54/0x233 [ 1189.637787][T18627] ? prepare_exit_to_usermode+0x154/0x1a0 [ 1189.643543][T18627] page_fault+0x34/0x40 [ 1189.647722][T18627] RIP: 0033:0x431016 [ 1189.651747][T18627] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 cc 5c 64 00 85 c0 0f 84 [ 1189.671394][T18627] RSP: 002b:00007ffc63b324c0 EFLAGS: 00010206 [ 1189.677488][T18627] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1189.685571][T18627] RDX: 000000000126e930 RSI: 0000000001276970 RDI: 0000000000000003 [ 1189.693566][T18627] RBP: 0000000000008041 R08: 0000000000000001 R09: 000000000126d940 [ 1189.701646][T18627] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1189.709649][T18627] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 16:40:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x0, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) [ 1189.794953][T18627] memory: usage 244kB, limit 0kB, failcnt 945 [ 1189.802392][T18627] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1189.829165][T18627] Memory cgroup stats for /syz3: [ 1189.829393][T18627] anon 94208 [ 1189.829393][T18627] file 45056 [ 1189.829393][T18627] kernel_stack 36864 [ 1189.829393][T18627] slab 278528 [ 1189.829393][T18627] sock 0 [ 1189.829393][T18627] shmem 0 [ 1189.829393][T18627] file_mapped 0 [ 1189.829393][T18627] file_dirty 135168 [ 1189.829393][T18627] file_writeback 0 [ 1189.829393][T18627] anon_thp 0 [ 1189.829393][T18627] inactive_anon 0 [ 1189.829393][T18627] active_anon 94208 [ 1189.829393][T18627] inactive_file 135168 [ 1189.829393][T18627] active_file 135168 [ 1189.829393][T18627] unevictable 135168 [ 1189.829393][T18627] slab_reclaimable 135168 [ 1189.829393][T18627] slab_unreclaimable 143360 16:40:45 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:40:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}, 0x400}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1189.829393][T18627] pgfault 53955 [ 1189.829393][T18627] pgmajfault 0 [ 1189.829393][T18627] workingset_refault 0 [ 1189.829393][T18627] workingset_activate 0 [ 1189.829393][T18627] workingset_nodereclaim 0 [ 1189.829393][T18627] pgrefill 198 [ 1189.829393][T18627] pgscan 198 [ 1189.829393][T18627] pgsteal 0 [ 1189.829393][T18627] pgactivate 198 16:40:45 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, 0x0, 0x0) 16:40:46 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000280008001c000100000000000000000000000000000000000010000002000000080002000000020008000100726564001c01020004010200b205a34f0459cc6abb699f4e08e3b1b5f75780560a59a8480dae55818041c02d8471389f5a076eaa787f8246aef232f41fb4fd095e664069035a011afb427b4799dc17338322cbd91968a88f2fbcbba734486e4d3c392ec5c40433021f006b4ddf02645062bacedcbcd61e4be8eea0e577dae0a23161a078fbdf38770e055341db2eca0ca565e8c92336422a57f6adad6ed581b27ccc9155e93c542353f1681423161cb1e44cc5b75a30515c051d3a8f0d2bcb9e9ebfa6290dd5fd8cd5150410922c3f86a3cee1d9e807ad3428f51c99eb16018bf7a6cd83dca6ff4af8a94fab0a1d86fded7a3835a987bd9f53499def9115ff45ce9d94aa0000000000000000140001000700000000000000000000000000000090755b1181d8ac64ad6e566b7b257541d4d4724304aa7f09742cb7aa1356d8a6ad0ffb6f29159b620809292345aed62b298e22129645d2c2df3a1049bb8561dc4bcf376aa1e40955892f428fef7bf7a683ebf60e73b5375d99d503b76a2eafe39c6e07a7ff905b71f6e41a8be26c62eb3d2530d15a1ab1d9ade93c7871a16f73894c05b9160fb84864e78c5ad2b627edd0d0393f66909ed0110ce53e3466384674a182dc5cf9e641af3ed8ad5f73c2061aef4a4f65c9ae577e81bff9f24354d65f4d1e7a5cf357bf520c903a35d6b21ca60a8728f6c2374d6070950331a750ce506b7fb85105121bba272f13b7e7692a525cf9855f6225739c944d37d257b902533ee7569e5d5df9c4673cdcaafaa26a75d5991552519f4500448ff3c95bef"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:40:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) [ 1190.270319][T18627] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=18627,uid=0 [ 1190.299484][T18627] Memory cgroup out of memory: Killed process 18627 (syz-executor.3) total-vm:72456kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 [ 1190.403209][ T1063] oom_reaper: reaped process 18627 (syz-executor.3), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 16:40:46 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:40:46 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, 0x0, 0x0) 16:40:46 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:40:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) [ 1191.845612][T14660] device bridge_slave_1 left promiscuous mode [ 1191.851988][T14660] bridge0: port 2(bridge_slave_1) entered disabled state [ 1191.905904][T14660] device bridge_slave_0 left promiscuous mode [ 1191.912155][T14660] bridge0: port 1(bridge_slave_0) entered disabled state [ 1192.735330][T14660] device hsr_slave_0 left promiscuous mode [ 1192.785126][T14660] device hsr_slave_1 left promiscuous mode [ 1192.842557][T14660] team0 (unregistering): Port device team_slave_1 removed [ 1192.853478][T14660] team0 (unregistering): Port device team_slave_0 removed [ 1192.864352][T14660] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1192.899287][T14660] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1192.960651][T14660] bond0 (unregistering): Released all slaves [ 1193.092806][T18683] IPVS: ftp: loaded support on port[0] = 21 [ 1193.156357][T18683] chnl_net:caif_netlink_parms(): no params data found [ 1193.255580][T18683] bridge0: port 1(bridge_slave_0) entered blocking state [ 1193.262784][T18683] bridge0: port 1(bridge_slave_0) entered disabled state [ 1193.274565][T18683] device bridge_slave_0 entered promiscuous mode [ 1193.282518][T18683] bridge0: port 2(bridge_slave_1) entered blocking state [ 1193.293750][T18683] bridge0: port 2(bridge_slave_1) entered disabled state [ 1193.301979][T18683] device bridge_slave_1 entered promiscuous mode [ 1193.332732][T18683] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1193.344028][T18683] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1193.373207][T18683] team0: Port device team_slave_0 added [ 1193.382512][T18683] team0: Port device team_slave_1 added [ 1193.458204][T18683] device hsr_slave_0 entered promiscuous mode [ 1193.505331][T18683] device hsr_slave_1 entered promiscuous mode [ 1193.558864][T18683] debugfs: Directory 'hsr0' with parent '/' already present! [ 1193.574790][T18683] bridge0: port 2(bridge_slave_1) entered blocking state [ 1193.581972][T18683] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1193.589367][T18683] bridge0: port 1(bridge_slave_0) entered blocking state [ 1193.596457][T18683] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1193.649217][T18683] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1193.663024][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1193.677453][ T4362] bridge0: port 1(bridge_slave_0) entered disabled state [ 1193.689947][ T4362] bridge0: port 2(bridge_slave_1) entered disabled state [ 1193.704798][T18683] 8021q: adding VLAN 0 to HW filter on device team0 [ 1193.722653][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1193.734529][ T4362] bridge0: port 1(bridge_slave_0) entered blocking state [ 1193.741691][ T4362] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1193.768135][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1193.777373][ T2912] bridge0: port 2(bridge_slave_1) entered blocking state [ 1193.784444][ T2912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1193.794631][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1193.807411][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1193.826174][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1193.836205][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1193.844734][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1193.855491][T18683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1193.876956][T18683] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1194.283003][T18693] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1194.293426][T18693] CPU: 0 PID: 18693 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1194.301439][T18693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1194.311551][T18693] Call Trace: [ 1194.314872][T18693] dump_stack+0xf5/0x159 [ 1194.319144][T18693] dump_header+0xaa/0x449 [ 1194.323578][T18693] oom_kill_process.cold+0x10/0x15 [ 1194.328799][T18693] out_of_memory+0x231/0xa00 [ 1194.333487][T18693] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1194.339116][T18693] ? timer_reduce+0xa4/0x830 [ 1194.343717][T18693] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1194.349413][T18693] mem_cgroup_out_of_memory+0x128/0x150 [ 1194.354977][T18693] memory_max_write+0x17b/0x250 [ 1194.359927][T18693] cgroup_file_write+0x119/0x320 [ 1194.364981][T18693] ? high_work_func+0x30/0x30 [ 1194.369684][T18693] kernfs_fop_write+0x1f4/0x2e0 [ 1194.374566][T18693] ? cgroup_css.part.0+0x90/0x90 [ 1194.379525][T18693] __vfs_write+0x67/0xc0 [ 1194.383819][T18693] ? kernfs_seq_show+0xe0/0xe0 [ 1194.388599][T18693] vfs_write+0x18a/0x390 [ 1194.392841][T18693] ksys_write+0xd5/0x1b0 [ 1194.397093][T18693] __x64_sys_write+0x4c/0x60 [ 1194.401767][T18693] do_syscall_64+0xcc/0x370 [ 1194.406339][T18693] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1194.412234][T18693] RIP: 0033:0x459f39 [ 1194.416178][T18693] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1194.435772][T18693] RSP: 002b:00007f338201ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1194.444186][T18693] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1194.452162][T18693] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 1194.460207][T18693] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1194.468206][T18693] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f338201b6d4 [ 1194.476179][T18693] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1194.488731][T18693] memory: usage 4668kB, limit 0kB, failcnt 1010 [ 1194.495372][T18693] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1194.502281][T18693] Memory cgroup stats for /syz1: [ 1194.502541][T18693] anon 4358144 [ 1194.502541][T18693] file 65536 [ 1194.502541][T18693] kernel_stack 36864 [ 1194.502541][T18693] slab 331776 [ 1194.502541][T18693] sock 0 [ 1194.502541][T18693] shmem 0 [ 1194.502541][T18693] file_mapped 0 [ 1194.502541][T18693] file_dirty 0 [ 1194.502541][T18693] file_writeback 0 [ 1194.502541][T18693] anon_thp 4194304 [ 1194.502541][T18693] inactive_anon 135168 [ 1194.502541][T18693] active_anon 4358144 [ 1194.502541][T18693] inactive_file 0 [ 1194.502541][T18693] active_file 0 [ 1194.502541][T18693] unevictable 135168 [ 1194.502541][T18693] slab_reclaimable 135168 [ 1194.502541][T18693] slab_unreclaimable 196608 [ 1194.502541][T18693] pgfault 58014 [ 1194.502541][T18693] pgmajfault 0 [ 1194.502541][T18693] workingset_refault 0 [ 1194.502541][T18693] workingset_activate 0 [ 1194.502541][T18693] workingset_nodereclaim 0 [ 1194.502541][T18693] pgrefill 269 [ 1194.502541][T18693] pgscan 267 [ 1194.502541][T18693] pgsteal 33 [ 1194.502541][T18693] pgactivate 231 [ 1194.599848][T18693] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=18689,uid=0 [ 1194.616321][T18693] Memory cgroup out of memory: Killed process 18689 (syz-executor.1) total-vm:72852kB, anon-rss:4244kB, file-rss:35824kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 1194.640622][ T1063] oom_reaper: reaped process 18689 (syz-executor.1), now anon-rss:0kB, file-rss:34864kB, shmem-rss:0kB 16:40:50 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:40:50 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r3, 0xc0045878, 0x0) 16:40:50 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:40:50 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:40:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:40:50 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, 0x0, 0x0) [ 1195.019452][T18683] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1195.057647][T18683] CPU: 1 PID: 18683 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1195.065601][T18683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1195.075695][T18683] Call Trace: [ 1195.079103][T18683] dump_stack+0xf5/0x159 [ 1195.083384][T18683] dump_header+0xaa/0x449 [ 1195.087768][T18683] oom_kill_process.cold+0x10/0x15 [ 1195.092943][T18683] out_of_memory+0x231/0xa00 [ 1195.097711][T18683] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1195.103398][T18683] mem_cgroup_out_of_memory+0x128/0x150 [ 1195.109037][T18683] try_charge+0xb3a/0xbc0 [ 1195.113410][T18683] ? rcu_note_context_switch+0x700/0x760 [ 1195.119635][T18683] mem_cgroup_try_charge+0xd2/0x260 [ 1195.124917][T18683] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1195.130617][T18683] wp_page_copy+0x322/0x1160 [ 1195.135298][T18683] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1195.141097][T18683] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1195.146838][T18683] do_wp_page+0x192/0x11f0 [ 1195.151319][T18683] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1195.157002][T18683] __handle_mm_fault+0x1c07/0x2cb0 [ 1195.162209][T18683] handle_mm_fault+0x21b/0x530 [ 1195.167090][T18683] __do_page_fault+0x3fb/0x9e0 [ 1195.172016][T18683] do_page_fault+0x54/0x233 [ 1195.176584][T18683] ? prepare_exit_to_usermode+0x154/0x1a0 [ 1195.182407][T18683] page_fault+0x34/0x40 [ 1195.186590][T18683] RIP: 0033:0x431016 [ 1195.190534][T18683] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 cc 5c 64 00 85 c0 0f 84 [ 1195.210270][T18683] RSP: 002b:00007fff6a24f710 EFLAGS: 00010206 16:40:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000140)) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'veth0_to_bridge\x00'}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000280)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000fee000/0x12000)=nil, &(0x7f0000000240)="db29fb436829", 0x6}, 0x68) r3 = syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x0) bind$inet6(r2, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1195.216377][T18683] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1195.224439][T18683] RDX: 0000000000acc930 RSI: 0000000000ad4970 RDI: 0000000000000003 [ 1195.232618][T18683] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000000acb940 [ 1195.240653][T18683] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1195.248639][T18683] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 16:40:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, 0x0, 0x0) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) [ 1195.364943][T18683] memory: usage 260kB, limit 0kB, failcnt 1023 [ 1195.374545][T18683] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1195.413672][T18683] Memory cgroup stats for /syz1: [ 1195.413963][T18683] anon 143360 [ 1195.413963][T18683] file 65536 [ 1195.413963][T18683] kernel_stack 0 [ 1195.413963][T18683] slab 331776 [ 1195.413963][T18683] sock 0 [ 1195.413963][T18683] shmem 0 [ 1195.413963][T18683] file_mapped 0 [ 1195.413963][T18683] file_dirty 0 [ 1195.413963][T18683] file_writeback 0 [ 1195.413963][T18683] anon_thp 0 [ 1195.413963][T18683] inactive_anon 135168 [ 1195.413963][T18683] active_anon 122880 [ 1195.413963][T18683] inactive_file 0 [ 1195.413963][T18683] active_file 0 [ 1195.413963][T18683] unevictable 135168 [ 1195.413963][T18683] slab_reclaimable 135168 [ 1195.413963][T18683] slab_unreclaimable 196608 [ 1195.413963][T18683] pgfault 58014 [ 1195.413963][T18683] pgmajfault 0 [ 1195.413963][T18683] workingset_refault 0 [ 1195.413963][T18683] workingset_activate 0 [ 1195.413963][T18683] workingset_nodereclaim 0 [ 1195.413963][T18683] pgrefill 269 [ 1195.413963][T18683] pgscan 267 [ 1195.413963][T18683] pgsteal 33 [ 1195.413963][T18683] pgactivate 231 16:40:51 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[], 0x0) 16:40:51 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000280008001c000100000000000000000000000000000000000010000002000000080002000000020008000100726564001c01020004010200b205a34f0459cc6abb699f4e08e3b1b5f75780560a59a8480dae55818041c02d8471389f5a076eaa787f8246aef232f41fb4fd095e664069035a011afb427b4799dc17338322cbd91968a88f2fbcbba734486e4d3c392ec5c40433021f006b4ddf02645062bacedcbcd61e4be8eea0e577dae0a23161a078fbdf38770e055341db2eca0ca565e8c92336422a57f6adad6ed581b27ccc9155e93c542353f1681423161cb1e44cc5b75a30515c051d3a8f0d2bcb9e9ebfa6290dd5fd8cd5150410922c3f86a3cee1d9e807ad3428f51c99eb16018bf7a6cd83dca6ff4af8a94fab0a1d86fded7a3835a987bd9f53499def9115ff45ce9d94aa0000000000000000140001000700000000000000000000000000000090755b1181d8ac64ad6e566b7b257541d4d4724304aa7f09742cb7aa1356d8a6ad0ffb6f29159b620809292345aed62b298e22129645d2c2df3a1049bb8561dc4bcf376aa1e40955892f428fef7bf7a683ebf60e73b5375d99d503b76a2eafe39c6e07a7ff905b71f6e41a8be26c62eb3d2530d15a1ab1d9ade93c7871a16f73894c05b9160fb84864e78c5ad2b627edd0d0393f66909ed0110ce53e3466384674a182dc5cf9e641af3ed8ad5f73c2061aef4a4f65c9ae577e81bff9f24354d65f4d1e7a5cf357bf520c903a35d6b21ca60a8728f6c2374d6070950331a750ce506b7fb85105121bba272f13b7e7692a525cf9855f6225739c944d37d257b902533ee7569e5d5df9c4673cdcaafaa26a75d5991552519f4500448ff3c95befb88a"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:40:51 executing program 0: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100, 0x1a) 16:40:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, 0x0, 0x0) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) [ 1196.055808][T18683] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=18683,uid=0 [ 1196.135778][T18683] Memory cgroup out of memory: Killed process 18683 (syz-executor.1) total-vm:72456kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 [ 1196.198425][ T1063] oom_reaper: reaped process 18683 (syz-executor.1), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 16:40:52 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:40:52 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[], 0x0) [ 1197.335587][T14660] device bridge_slave_1 left promiscuous mode [ 1197.341920][T14660] bridge0: port 2(bridge_slave_1) entered disabled state [ 1197.406296][T14660] device bridge_slave_0 left promiscuous mode [ 1197.412619][T14660] bridge0: port 1(bridge_slave_0) entered disabled state [ 1198.215388][T14660] device hsr_slave_0 left promiscuous mode [ 1198.275144][T14660] device hsr_slave_1 left promiscuous mode [ 1198.334027][T14660] team0 (unregistering): Port device team_slave_1 removed [ 1198.345012][T14660] team0 (unregistering): Port device team_slave_0 removed [ 1198.355783][T14660] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1198.389726][T14660] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1198.470630][T14660] bond0 (unregistering): Released all slaves [ 1198.573805][T18731] IPVS: ftp: loaded support on port[0] = 21 [ 1198.636932][T18731] chnl_net:caif_netlink_parms(): no params data found [ 1198.670090][T18731] bridge0: port 1(bridge_slave_0) entered blocking state [ 1198.677285][T18731] bridge0: port 1(bridge_slave_0) entered disabled state [ 1198.685617][T18731] device bridge_slave_0 entered promiscuous mode [ 1198.693270][T18731] bridge0: port 2(bridge_slave_1) entered blocking state [ 1198.700412][T18731] bridge0: port 2(bridge_slave_1) entered disabled state [ 1198.708355][T18731] device bridge_slave_1 entered promiscuous mode [ 1198.780946][T18731] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1198.792355][T18731] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1198.820666][T18731] team0: Port device team_slave_0 added [ 1198.831559][T18731] team0: Port device team_slave_1 added [ 1198.988121][T18731] device hsr_slave_0 entered promiscuous mode [ 1199.085398][T18731] device hsr_slave_1 entered promiscuous mode [ 1199.128065][T18731] debugfs: Directory 'hsr0' with parent '/' already present! [ 1199.148788][T18731] bridge0: port 2(bridge_slave_1) entered blocking state [ 1199.155924][T18731] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1199.163320][T18731] bridge0: port 1(bridge_slave_0) entered blocking state [ 1199.170442][T18731] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1199.211195][T18731] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1199.230128][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1199.242533][ T4358] bridge0: port 1(bridge_slave_0) entered disabled state [ 1199.251674][ T4358] bridge0: port 2(bridge_slave_1) entered disabled state [ 1199.271491][T18731] 8021q: adding VLAN 0 to HW filter on device team0 [ 1199.288742][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1199.300224][ T4358] bridge0: port 1(bridge_slave_0) entered blocking state [ 1199.307342][ T4358] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1199.327729][ T4363] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1199.336668][ T4363] bridge0: port 2(bridge_slave_1) entered blocking state [ 1199.343716][ T4363] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1199.371782][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1199.381572][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1199.390967][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1199.400088][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1199.412315][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1199.425317][T18731] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1199.443851][T18731] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1199.839616][T18741] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1199.853618][T18741] CPU: 1 PID: 18741 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1199.861755][T18741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1199.871918][T18741] Call Trace: [ 1199.875354][T18741] dump_stack+0xf5/0x159 [ 1199.879706][T18741] dump_header+0xaa/0x449 [ 1199.884066][T18741] oom_kill_process.cold+0x10/0x15 [ 1199.889233][T18741] out_of_memory+0x231/0xa00 [ 1199.893842][T18741] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1199.899529][T18741] mem_cgroup_out_of_memory+0x128/0x150 [ 1199.905125][T18741] memory_max_write+0x17b/0x250 [ 1199.910075][T18741] cgroup_file_write+0x119/0x320 [ 1199.915065][T18741] ? high_work_func+0x30/0x30 [ 1199.919828][T18741] kernfs_fop_write+0x1f4/0x2e0 [ 1199.924700][T18741] ? cgroup_css.part.0+0x90/0x90 [ 1199.929681][T18741] __vfs_write+0x67/0xc0 [ 1199.933951][T18741] ? kernfs_seq_show+0xe0/0xe0 [ 1199.938739][T18741] vfs_write+0x18a/0x390 [ 1199.943014][T18741] ksys_write+0xd5/0x1b0 [ 1199.947376][T18741] __x64_sys_write+0x4c/0x60 [ 1199.951990][T18741] do_syscall_64+0xcc/0x370 [ 1199.956523][T18741] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1199.962490][T18741] RIP: 0033:0x459f39 [ 1199.966496][T18741] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1199.986117][T18741] RSP: 002b:00007f9a64f4bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1199.994679][T18741] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1200.007264][T18741] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 1200.015320][T18741] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1200.023302][T18741] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9a64f4c6d4 [ 1200.031484][T18741] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1200.041883][T18741] memory: usage 2608kB, limit 0kB, failcnt 954 [ 1200.048830][T18741] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1200.055998][T18741] Memory cgroup stats for /syz3: [ 1200.056274][T18741] anon 2183168 [ 1200.056274][T18741] file 45056 [ 1200.056274][T18741] kernel_stack 36864 [ 1200.056274][T18741] slab 278528 [ 1200.056274][T18741] sock 0 [ 1200.056274][T18741] shmem 0 [ 1200.056274][T18741] file_mapped 0 [ 1200.056274][T18741] file_dirty 135168 [ 1200.056274][T18741] file_writeback 0 [ 1200.056274][T18741] anon_thp 2097152 [ 1200.056274][T18741] inactive_anon 0 [ 1200.056274][T18741] active_anon 2183168 [ 1200.056274][T18741] inactive_file 135168 [ 1200.056274][T18741] active_file 135168 [ 1200.056274][T18741] unevictable 135168 [ 1200.056274][T18741] slab_reclaimable 135168 [ 1200.056274][T18741] slab_unreclaimable 143360 [ 1200.056274][T18741] pgfault 54054 [ 1200.056274][T18741] pgmajfault 0 [ 1200.056274][T18741] workingset_refault 0 [ 1200.056274][T18741] workingset_activate 0 [ 1200.056274][T18741] workingset_nodereclaim 0 [ 1200.056274][T18741] pgrefill 198 [ 1200.056274][T18741] pgscan 198 [ 1200.056274][T18741] pgsteal 0 [ 1200.056274][T18741] pgactivate 198 [ 1200.153868][T18741] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=18737,uid=0 [ 1200.170267][T18741] Memory cgroup out of memory: Killed process 18737 (syz-executor.3) total-vm:72852kB, anon-rss:2144kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 1200.193536][ T1063] oom_reaper: reaped process 18737 (syz-executor.3), now anon-rss:0kB, file-rss:34864kB, shmem-rss:0kB 16:40:56 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:40:56 executing program 0: openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0xfd1, 0x4) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000002c0)=""/243) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @broadcast}, 0x10) r1 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x2200cf7d, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0x1fa0}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'team0\x00'}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 16:40:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, 0x0, 0x0) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:40:56 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:40:56 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3faf0dc32648b1f6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) [ 1200.584281][T18731] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1200.594385][T18731] CPU: 1 PID: 18731 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 1200.602303][T18731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1200.612374][T18731] Call Trace: [ 1200.615714][T18731] dump_stack+0xf5/0x159 [ 1200.619992][T18731] dump_header+0xaa/0x449 [ 1200.624359][T18731] oom_kill_process.cold+0x10/0x15 [ 1200.629673][T18731] out_of_memory+0x231/0xa00 [ 1200.634343][T18731] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1200.640078][T18731] mem_cgroup_out_of_memory+0x128/0x150 [ 1200.645773][T18731] try_charge+0xb3a/0xbc0 [ 1200.650142][T18731] ? rcu_note_context_switch+0x700/0x760 [ 1200.655885][T18731] mem_cgroup_try_charge+0xd2/0x260 [ 1200.661151][T18731] mem_cgroup_try_charge_delay+0x3a/0x80 [ 1200.666890][T18731] wp_page_copy+0x322/0x1160 [ 1200.671589][T18731] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1200.677314][T18731] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1200.683051][T18731] do_wp_page+0x192/0x11f0 [ 1200.687498][T18731] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1200.693171][T18731] __handle_mm_fault+0x1c07/0x2cb0 [ 1200.698359][T18731] handle_mm_fault+0x21b/0x530 [ 1200.703185][T18731] __do_page_fault+0x3fb/0x9e0 [ 1200.707990][T18731] do_page_fault+0x54/0x233 [ 1200.712574][T18731] ? prepare_exit_to_usermode+0x154/0x1a0 [ 1200.718314][T18731] page_fault+0x34/0x40 [ 1200.722480][T18731] RIP: 0033:0x431016 [ 1200.726414][T18731] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 cc 5c 64 00 85 c0 0f 84 [ 1200.746084][T18731] RSP: 002b:00007ffc46ec7a70 EFLAGS: 00010206 [ 1200.752221][T18731] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1200.760243][T18731] RDX: 000000000267b930 RSI: 0000000002683970 RDI: 0000000000000003 [ 1200.768316][T18731] RBP: 0000000000008041 R08: 0000000000000001 R09: 000000000267a940 [ 1200.776354][T18731] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 16:40:56 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[], 0x0) [ 1200.784611][T18731] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 [ 1200.847221][T18731] memory: usage 252kB, limit 0kB, failcnt 971 [ 1200.853356][T18731] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1200.874985][T18731] Memory cgroup stats for /syz3: [ 1200.875631][T18731] anon 65536 [ 1200.875631][T18731] file 45056 [ 1200.875631][T18731] kernel_stack 36864 [ 1200.875631][T18731] slab 278528 [ 1200.875631][T18731] sock 0 [ 1200.875631][T18731] shmem 0 [ 1200.875631][T18731] file_mapped 0 [ 1200.875631][T18731] file_dirty 135168 [ 1200.875631][T18731] file_writeback 0 [ 1200.875631][T18731] anon_thp 0 [ 1200.875631][T18731] inactive_anon 0 [ 1200.875631][T18731] active_anon 65536 [ 1200.875631][T18731] inactive_file 135168 [ 1200.875631][T18731] active_file 135168 [ 1200.875631][T18731] unevictable 135168 [ 1200.875631][T18731] slab_reclaimable 135168 [ 1200.875631][T18731] slab_unreclaimable 143360 [ 1200.875631][T18731] pgfault 54054 [ 1200.875631][T18731] pgmajfault 0 [ 1200.875631][T18731] workingset_refault 0 [ 1200.875631][T18731] workingset_activate 0 [ 1200.875631][T18731] workingset_nodereclaim 0 [ 1200.875631][T18731] pgrefill 198 [ 1200.875631][T18731] pgscan 198 [ 1200.875631][T18731] pgsteal 0 [ 1200.875631][T18731] pgactivate 198 16:40:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:40:56 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x0) 16:40:57 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:40:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 16:40:57 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x0) 16:40:57 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000280008001c000100000000000000000000000000000000000010000002000000080002000000020008000100726564001c01020004010200b205a34f0459cc6abb699f4e08e3b1b5f75780560a59a8480dae55818041c02d8471389f5a076eaa787f8246aef232f41fb4fd095e664069035a011afb427b4799dc17338322cbd91968a88f2fbcbba734486e4d3c392ec5c40433021f006b4ddf02645062bacedcbcd61e4be8eea0e577dae0a23161a078fbdf38770e055341db2eca0ca565e8c92336422a57f6adad6ed581b27ccc9155e93c542353f1681423161cb1e44cc5b75a30515c051d3a8f0d2bcb9e9ebfa6290dd5fd8cd5150410922c3f86a3cee1d9e807ad3428f51c99eb16018bf7a6cd83dca6ff4af8a94fab0a1d86fded7a3835a987bd9f53499def9115ff45ce9d94aa0000000000000000140001000700000000000000000000000000000090755b1181d8ac64ad6e566b7b257541d4d4724304aa7f09742cb7aa1356d8a6ad0ffb6f29159b620809292345aed62b298e22129645d2c2df3a1049bb8561dc4bcf376aa1e40955892f428fef7bf7a683ebf60e73b5375d99d503b76a2eafe39c6e07a7ff905b71f6e41a8be26c62eb3d2530d15a1ab1d9ade93c7871a16f73894c05b9160fb84864e78c5ad2b627edd0d0393f66909ed0110ce53e3466384674a182dc5cf9e641af3ed8ad5f73c2061aef4a4f65c9ae577e81bff9f24354d65f4d1e7a5cf357bf520c903a35d6b21ca60a8728f6c2374d6070950331a750ce506b7fb85105121bba272f13b7e7692a525cf9855f6225739c944d37d257b902533ee7569e5d5df9c4673cdcaafaa26a75d5991552519f4500448ff3c95befb88ae0"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1201.643946][T18731] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=18731,uid=0 [ 1201.750478][T18731] Memory cgroup out of memory: Killed process 18731 (syz-executor.3) total-vm:72456kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 [ 1201.835705][ T1063] oom_reaper: reaped process 18731 (syz-executor.3), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 16:40:58 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000a00)=ANY=[@ANYBLOB='7:2\t'], 0x4) socket$kcm(0x29, 0x5, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="006d656d6f727920d5ac3c87683a4251072d42c213c465978fcb4c117a1f89715c0dda05dd629f5122111e308ec79d0c81e240aec9145ab407061c22dec9795669adc42506f9b54c20fe51c8e52a8cbfeef780f281e3ee79c09bc7d7bef9af3461c4f6df93de91b806894fe590b0ba28"], 0xda00) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) write$cgroup_int(r3, 0x0, 0x0) 16:40:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fgetxattr(r0, &(0x7f0000000040)=@known='system.sockprotoname\x00', &(0x7f0000000140)=""/131, 0x83) 16:40:58 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000003c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x0) 16:40:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) [ 1203.145784][T14666] device bridge_slave_1 left promiscuous mode [ 1203.152078][T14666] bridge0: port 2(bridge_slave_1) entered disabled state [ 1203.206045][T14666] device bridge_slave_0 left promiscuous mode [ 1203.212461][T14666] bridge0: port 1(bridge_slave_0) entered disabled state [ 1204.005324][T14666] device hsr_slave_0 left promiscuous mode [ 1204.055159][T14666] device hsr_slave_1 left promiscuous mode [ 1204.112567][T14666] team0 (unregistering): Port device team_slave_1 removed [ 1204.124620][T14666] team0 (unregistering): Port device team_slave_0 removed [ 1204.135941][T14666] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1204.180077][T14666] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1204.261728][T14666] bond0 (unregistering): Released all slaves [ 1204.343974][T18784] IPVS: ftp: loaded support on port[0] = 21 [ 1204.407256][T18784] chnl_net:caif_netlink_parms(): no params data found [ 1204.491891][T18784] bridge0: port 1(bridge_slave_0) entered blocking state [ 1204.501398][T18784] bridge0: port 1(bridge_slave_0) entered disabled state [ 1204.511615][T18784] device bridge_slave_0 entered promiscuous mode [ 1204.522324][T18784] bridge0: port 2(bridge_slave_1) entered blocking state [ 1204.531456][T18784] bridge0: port 2(bridge_slave_1) entered disabled state [ 1204.542696][T18784] device bridge_slave_1 entered promiscuous mode [ 1204.570639][T18784] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1204.584693][T18784] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1204.614110][T18784] team0: Port device team_slave_0 added [ 1204.624649][T18784] team0: Port device team_slave_1 added [ 1204.688845][T18784] device hsr_slave_0 entered promiscuous mode [ 1204.738178][T18784] device hsr_slave_1 entered promiscuous mode [ 1204.815026][T18784] debugfs: Directory 'hsr0' with parent '/' already present! [ 1204.835952][T18784] bridge0: port 2(bridge_slave_1) entered blocking state [ 1204.843108][T18784] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1204.850512][T18784] bridge0: port 1(bridge_slave_0) entered blocking state [ 1204.857678][T18784] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1204.909861][T18784] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1204.923943][ T4362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1204.938096][ T4362] bridge0: port 1(bridge_slave_0) entered disabled state [ 1204.950159][ T4362] bridge0: port 2(bridge_slave_1) entered disabled state [ 1204.966076][T18784] 8021q: adding VLAN 0 to HW filter on device team0 [ 1204.982506][ T4363] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1204.992420][ T4363] bridge0: port 1(bridge_slave_0) entered blocking state [ 1204.999507][ T4363] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1205.032717][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1205.041695][ T2912] bridge0: port 2(bridge_slave_1) entered blocking state [ 1205.048790][ T2912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1205.062620][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1205.072017][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1205.087664][T18784] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1205.098499][T18784] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1205.111305][ T4363] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1205.120113][ T4363] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1205.129507][ T4363] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1205.140193][ T4363] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1205.164608][T18784] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1205.554770][T18794] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1205.569379][T18794] CPU: 1 PID: 18794 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1205.577455][T18794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1205.587520][T18794] Call Trace: [ 1205.590842][T18794] dump_stack+0xf5/0x159 [ 1205.595108][T18794] dump_header+0xaa/0x449 [ 1205.599571][T18794] oom_kill_process.cold+0x10/0x15 [ 1205.604868][T18794] out_of_memory+0x231/0xa00 [ 1205.609495][T18794] ? preempt_schedule_common+0x37/0x90 [ 1205.615057][T18794] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1205.620734][T18794] mem_cgroup_out_of_memory+0x128/0x150 [ 1205.626338][T18794] memory_max_write+0x17b/0x250 [ 1205.631221][T18794] cgroup_file_write+0x119/0x320 [ 1205.636278][T18794] ? high_work_func+0x30/0x30 [ 1205.641028][T18794] kernfs_fop_write+0x1f4/0x2e0 [ 1205.645907][T18794] ? cgroup_css.part.0+0x90/0x90 [ 1205.650972][T18794] __vfs_write+0x67/0xc0 [ 1205.655232][T18794] ? kernfs_seq_show+0xe0/0xe0 [ 1205.660105][T18794] vfs_write+0x18a/0x390 [ 1205.664380][T18794] ksys_write+0xd5/0x1b0 [ 1205.668650][T18794] __x64_sys_write+0x4c/0x60 [ 1205.673291][T18794] do_syscall_64+0xcc/0x370 [ 1205.677819][T18794] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1205.683739][T18794] RIP: 0033:0x459f39 [ 1205.687673][T18794] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1205.707342][T18794] RSP: 002b:00007f1a74cc9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1205.716952][T18794] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1205.724940][T18794] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 1205.732957][T18794] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1205.740937][T18794] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1a74cca6d4 [ 1205.748938][T18794] R13: 00000000004ca618 R14: 00000000004e25c0 R15: 00000000ffffffff [ 1205.760559][T18794] memory: usage 4668kB, limit 0kB, failcnt 1032 [ 1205.767008][T18794] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1205.773856][T18794] Memory cgroup stats for /syz1: [ 1205.773994][T18794] anon 4374528 [ 1205.773994][T18794] file 65536 [ 1205.773994][T18794] kernel_stack 36864 [ 1205.773994][T18794] slab 331776 [ 1205.773994][T18794] sock 0 [ 1205.773994][T18794] shmem 0 [ 1205.773994][T18794] file_mapped 0 [ 1205.773994][T18794] file_dirty 0 [ 1205.773994][T18794] file_writeback 0 [ 1205.773994][T18794] anon_thp 4194304 [ 1205.773994][T18794] inactive_anon 135168 [ 1205.773994][T18794] active_anon 4374528 [ 1205.773994][T18794] inactive_file 0 [ 1205.773994][T18794] active_file 0 [ 1205.773994][T18794] unevictable 135168 [ 1205.773994][T18794] slab_reclaimable 135168 [ 1205.773994][T18794] slab_unreclaimable 196608 [ 1205.773994][T18794] pgfault 58080 [ 1205.773994][T18794] pgmajfault 0 [ 1205.773994][T18794] workingset_refault 0 [ 1205.773994][T18794] workingset_activate 0 [ 1205.773994][T18794] workingset_nodereclaim 0 [ 1205.773994][T18794] pgrefill 269 [ 1205.773994][T18794] pgscan 267 [ 1205.773994][T18794] pgsteal 33 [ 1205.773994][T18794] pgactivate 231 [ 1205.870670][T18794] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=18791,uid=0 [ 1205.887426][T18794] Memory cgroup out of memory: Killed process 18791 (syz-executor.1) total-vm:72852kB, anon-rss:4248kB, file-rss:35820kB, shmem-rss:0kB, UID:0 pgtables:151552kB oom_score_adj:1000 [ 1205.909780][ T1063] oom_reaper: reaped process 18791 (syz-executor.1), now anon-rss:0kB, file-rss:34864kB, shmem-rss:0kB [ 1205.961568][T18792] ================================================================== [ 1205.969672][T18792] BUG: KCSAN: data-race in bio_endio / blk_throtl_bio [ 1205.976403][T18792] [ 1205.978722][T18792] read to 0xffff888122682e54 of 2 bytes by interrupt on cpu 1: [ 1205.986265][T18792] bio_endio+0x3e/0x4f0 [ 1205.990399][T18792] blk_update_request+0x427/0x7b0 [ 1205.995412][T18792] scsi_end_request+0x6b/0x3e0 [ 1206.000173][T18792] scsi_io_completion+0x11d/0xc80 [ 1206.005191][T18792] scsi_finish_command+0x280/0x380 [ 1206.010290][T18792] scsi_softirq_done+0x259/0x280 [ 1206.015212][T18792] blk_done_softirq+0x1eb/0x250 [ 1206.020044][T18792] __do_softirq+0x115/0x33f [ 1206.024525][T18792] irq_exit+0xbb/0xe0 [ 1206.028485][T18792] do_IRQ+0xa6/0x180 [ 1206.032376][T18792] ret_from_intr+0x0/0x19 [ 1206.036698][T18792] native_safe_halt+0xe/0x10 [ 1206.041269][T18792] arch_cpu_idle+0x1f/0x30 [ 1206.045672][T18792] default_idle_call+0x1e/0x40 [ 1206.050423][T18792] [ 1206.052749][T18792] write to 0xffff888122682e54 of 2 bytes by task 18792 on cpu 0: [ 1206.060452][T18792] blk_throtl_bio+0x113/0x1830 [ 1206.065202][T18792] generic_make_request_checks+0x6ef/0x1130 [ 1206.071073][T18792] generic_make_request+0x3e/0x740 [ 1206.076164][T18792] __blk_queue_split+0x767/0xb40 [ 1206.081081][T18792] blk_mq_make_request+0x104/0xf60 [ 1206.086169][T18792] generic_make_request+0x196/0x740 [ 1206.091356][T18792] submit_bio+0x96/0x3c0 [ 1206.095591][T18792] do_blockdev_direct_IO+0x617a/0x78c0 [ 1206.101049][T18792] __blockdev_direct_IO+0x86/0xa0 [ 1206.106056][T18792] ext4_direct_IO+0x6f5/0xf70 [ 1206.110727][T18792] generic_file_direct_write+0x14d/0x2e0 [ 1206.116338][T18792] __generic_file_write_iter+0x17e/0x380 [ 1206.121953][T18792] ext4_file_write_iter+0x1bd/0xa00 [ 1206.127131][T18792] [ 1206.129437][T18792] Reported by Kernel Concurrency Sanitizer on: [ 1206.135574][T18792] CPU: 0 PID: 18792 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1206.143451][T18792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1206.153481][T18792] ================================================================== [ 1206.161609][T18792] Kernel panic - not syncing: panic_on_warn set ... [ 1206.168178][T18792] CPU: 0 PID: 18792 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 1206.176039][T18792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1206.186068][T18792] Call Trace: [ 1206.189348][T18792] dump_stack+0xf5/0x159 [ 1206.193572][T18792] panic+0x210/0x640 [ 1206.197478][T18792] ? __blockdev_direct_IO+0x86/0xa0 [ 1206.202694][T18792] ? vprintk_func+0x8d/0x140 [ 1206.207268][T18792] kcsan_report.cold+0xc/0x10 [ 1206.211926][T18792] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 1206.217454][T18792] ? should_fail+0xd4/0x45d [ 1206.221937][T18792] __tsan_write2+0x32/0x40 [ 1206.226383][T18792] blk_throtl_bio+0x113/0x1830 [ 1206.231186][T18792] ? kmem_cache_alloc+0x1f3/0x5d0 [ 1206.236252][T18792] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1206.241869][T18792] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1206.247481][T18792] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1206.253091][T18792] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1206.258882][T18792] generic_make_request_checks+0x6ef/0x1130 [ 1206.264772][T18792] generic_make_request+0x3e/0x740 [ 1206.270696][T18792] ? blk_add_trace_unplug+0xd0/0xd0 [ 1206.275886][T18792] ? __tsan_read8+0x2c/0x30 [ 1206.280370][T18792] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1206.285990][T18792] ? blk_add_trace_split+0x16c/0x1b0 [ 1206.291263][T18792] __blk_queue_split+0x767/0xb40 [ 1206.296200][T18792] blk_mq_make_request+0x104/0xf60 [ 1206.301379][T18792] ? blk_queue_enter+0x53b/0x610 [ 1206.306311][T18792] generic_make_request+0x196/0x740 [ 1206.311507][T18792] ? apic_timer_interrupt+0xa/0x20 [ 1206.316602][T18792] submit_bio+0x96/0x3c0 [ 1206.320827][T18792] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1206.326458][T18792] do_blockdev_direct_IO+0x617a/0x78c0 [ 1206.331916][T18792] ? ext4_dio_get_block_unwritten_sync+0xc0/0xc0 [ 1206.338225][T18792] ? ext4_dio_get_block_unwritten_sync+0xc0/0xc0 [ 1206.344539][T18792] __blockdev_direct_IO+0x86/0xa0 [ 1206.349546][T18792] ? write_end_fn+0xd0/0xd0 [ 1206.354029][T18792] ext4_direct_IO+0x6f5/0xf70 [ 1206.358685][T18792] ? ext4_dio_get_block_unwritten_sync+0xc0/0xc0 [ 1206.365116][T18792] generic_file_direct_write+0x14d/0x2e0 [ 1206.370778][T18792] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1206.376405][T18792] __generic_file_write_iter+0x17e/0x380 [ 1206.382064][T18792] ext4_file_write_iter+0x1bd/0xa00 [ 1206.387252][T18792] new_sync_write+0x388/0x4a0 [ 1206.391909][T18792] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 1206.397632][T18792] __vfs_write+0xb1/0xc0 [ 1206.401893][T18792] vfs_write+0x18a/0x390 [ 1206.406131][T18792] ksys_write+0xd5/0x1b0 [ 1206.410358][T18792] __x64_sys_write+0x4c/0x60 [ 1206.414939][T18792] do_syscall_64+0xcc/0x370 [ 1206.419434][T18792] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1206.425305][T18792] RIP: 0033:0x459f39 [ 1206.429186][T18792] Code: Bad RIP value. [ 1206.433226][T18792] RSP: 002b:00007f1a74d0bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1206.441622][T18792] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f39 [ 1206.449580][T18792] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000016 [ 1206.457530][T18792] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1206.465480][T18792] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1a74d0c6d4 [ 1206.473431][T18792] R13: 00000000004ca629 R14: 00000000004e25d8 R15: 00000000ffffffff [ 1206.482945][T18792] Kernel Offset: disabled [ 1206.487280][T18792] Rebooting in 86400 seconds..