940 [ 1160.248285][ T5192] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000714698 [ 1160.257254][ T5192] R13: 0000000000714698 R14: 0000000000000000 R15: 0000000000002710 [ 1160.274686][ T5209] __nla_validate_parse: 7 callbacks suppressed [ 1160.274731][ T5209] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1160.301877][ T5207] device nr0 entered promiscuous mode 10:48:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0xffffffff00000000}, 0x0) [ 1160.341269][ T5215] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1160.443517][ T5192] memory: usage 856kB, limit 0kB, failcnt 458498 [ 1160.449999][ T5192] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1160.464162][ T5192] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1160.471160][ T5192] Memory cgroup stats for /syz5: cache:60KB rss:48KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:48KB inactive_file:116KB active_file:112KB unevictable:0KB [ 1160.497730][ T5220] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1160.526456][ T5221] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:48:53 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2e00000052008100a00f80ecdb4cb904024865160b000100feffffff000004000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 1160.552218][ T5192] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=5192,uid=0 10:48:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0xffffffffa0008000}, 0x0) [ 1160.613480][ T5192] Memory cgroup out of memory: Killed process 5192 (syz-executor.5) total-vm:72448kB, anon-rss:68kB, file-rss:34828kB, shmem-rss:0kB [ 1160.673974][ T1044] oom_reaper: reaped process 5192 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 10:48:53 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'.o\x00\x00\x02\x00\x02\x00\x00\x00\x00\x00\x00\x00\x06@', 0x1000}) r0 = socket$kcm(0xa, 0x2, 0x11) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x29, 0x22, &(0x7f0000000240)=r1, 0x4) [ 1160.737068][ T5227] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:48:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x285, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x68, 0xc, 0x0, 0x3, 0x7, 0x20, 0x1, 0x80000000, 0x4, 0x0, 0x3ff, 0xdfd, 0x0, 0x2, 0xda8, 0xffffffff, 0x80000001, 0x3, 0x36cf000000, 0x0, 0x0, 0xfffffffffffffffe, 0x7, 0xffffffff, 0x376, 0xfffffffffffffffe, 0x0, 0x80000001, 0x8, 0x3, 0x0, 0xfff, 0x2, @perf_bp={0x0, 0x1}, 0x800, 0x2, 0x8, 0x3}, r0, 0xb, 0xffffffffffffff9c, 0x4) close(r1) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={0x0, r0, 0x1f, 0x1}, 0x14) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) openat$cgroup_ro(r0, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0xfffffffffffff1ee, 0xe756, 0x4aed7cdc, 0x4, 0x0, 0x100000000, 0x4, 0x1, 0x8, 0x8, 0x99, 0x671, 0x349, 0x1, 0x80000001, 0x7ff, 0x2, 0x744, 0x1000, 0x6, 0x6, 0x9, 0x9, 0x2, 0x3, 0x3, 0x6a, 0xff, 0x7, 0x5, 0x0, 0x8001, 0x2, 0x4, 0x1, 0x8, 0x0, 0x2, 0x0, @perf_config_ext={0x3, 0x7fffffff}, 0x1000, 0x20, 0xff, 0x4, 0x2a04, 0xd2f4, 0x6}, 0x0, 0xb, r0, 0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0xc, 0x0, 0x1}, 0x2c) gettid() bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001480)='./file0\x00', 0x4) close(r3) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001440)='./cgroup.cpu/syz1\x00', 0x1ff) [ 1160.818822][ T5230] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:48:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0xffffffffa0010000}, 0x0) [ 1160.981024][ T5237] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:48:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0xffffffffffffff01, 0x80000001, 0x4, 0x0, 0x10001, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) [ 1161.244898][ T5213] device nr0 entered promiscuous mode 10:48:53 executing program 1: r0 = getpid() r1 = perf_event_open$cgroup(&(0x7f0000000100)={0x3, 0x70, 0x9, 0x1f3c, 0xfffffffffffffff8, 0x3ff, 0x0, 0x0, 0x0, 0xc, 0x8, 0x4, 0xdda, 0xfffffffffffffffb, 0x800, 0xfffffffffffffffc, 0x1, 0xffffffffffffffff, 0x2, 0x6d6, 0x80000000, 0x42, 0xfffffffffffffffc, 0x0, 0x8, 0x3, 0x800000000000, 0x6, 0x1ac, 0x9, 0xbb, 0x6, 0x8, 0x48a5, 0x7, 0x7, 0x8, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x7fffffff, 0x1}, 0x8800, 0x0, 0x8, 0xd, 0x6, 0xffffffff00000000, 0x100000001}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000080)={0x7, 0x70, 0xd94b, 0x4, 0x5, 0x1, 0x0, 0x7, 0x20600, 0xb, 0x80, 0x200000000000000, 0x5, 0x3ff, 0x2, 0x8a, 0x8, 0x3, 0x40000, 0xffffffff, 0x800, 0x546f, 0x2, 0x200, 0x8, 0x1, 0x5, 0xd25, 0x6, 0xffffffff, 0x6, 0x80000000, 0x7ff, 0xbf45, 0x5, 0x0, 0x100000000, 0xac89, 0x0, 0x40, 0x4, @perf_bp={&(0x7f0000000040), 0x4}, 0x8110, 0x6, 0x0, 0x3, 0x7, 0x5, 0x2}, r0, 0x1, r1, 0x1) r2 = socket$kcm(0x10, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x10e, 0x32, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0x80000000, 0x4) 10:48:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0xfffffffffffff000}, 0x0) 10:48:53 executing program 2: r0 = socket$kcm(0xa, 0x400000000000002, 0x11) sendmsg$inet(r0, &(0x7f0000000900)={&(0x7f0000000380)={0x2, 0x4e24, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000840)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x4, [@local, @broadcast]}]}}}], 0x20}, 0x0) recvmsg$kcm(r0, &(0x7f0000005000)={&(0x7f0000004dc0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000004f80)=[{&(0x7f0000004e40)=""/82, 0x52}, {&(0x7f0000004ec0)=""/119, 0x77}, {&(0x7f0000004f40)=""/42, 0x2a}], 0x3, &(0x7f0000004fc0)=""/42, 0x2a}, 0x2000) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f00000008c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r2, &(0x7f00000009c0)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0x0, 0x100, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000007c0)='memory.swap.current\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x17, 0x5, &(0x7f0000000340)=@raw=[@map={0x18, 0xf, 0x1, 0x0, r3}, @alu={0x4, 0xffffffffffff0000, 0x9, 0x0, 0x3, 0x0, 0xfffffffffffffffc}, @generic={0x1ff, 0x6, 0x7, 0x3, 0x7fff}, @ldst={0x3, 0x3, 0x0, 0x8, 0x4, 0x0, 0xfffffffffffffffc}], &(0x7f0000000680)='GPL\x00', 0x3, 0xf8, &(0x7f00000006c0)=""/248, 0x41000, 0x2, [], r1, 0xb, r4, 0x8, &(0x7f0000000800)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000880)={0x3, 0xd, 0x8, 0x38f}, 0x10}, 0x70) sendmsg$inet(r0, &(0x7f0000005080)={&(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000040)="0dc18c5aefd22051f8982061b36a7ec9e2967deba64e7aeb0ba603b6c5aa4444912205f4c721a5f1199f7175430092822b5ee28300e2b4810e1d82c2b1952e64a91294d3426cb59907612744dc5c11cf4b6d050d0eee09fbb7afd58e6f05e64146488debe39d3d3204ecb8333053a67cdd2dffe099726858e9715a13b2b8f12154eb8884b7d762ef65c3f4409ef1159034c75ca8f7a2a15dc0a925fcf4970539be7b1d6cb5239c437958d4d3163980130bd1eda5546d2a03ddddbaff3133d411605ffc", 0xc3}, {&(0x7f0000000140)="2c35e89a2773cfd4413e5f1009416993a15f4957b4ac78fb80d1ea2b368dc88ef98c9db315027975bf36f8a7fea288db99dd0ccc469e98bfc66d0f56be5c2e31cac0f38c46615ec15e26a7db2cc97884e6b90437fbfbe5c154f77c24985e828ff3a30fe3de893c766da6462d2c887f488966d0450e0e5239702c2f7dd6388edd", 0x80}, {&(0x7f00000001c0)="6cd0da9df5d3d3a59cb6d17dcd62feb80ade1b5ae61c683040d11a3003ded3bfff0c42fb3033010f68fd8955cbab47e3f7baf9da5885c05319a8241d7d43e277e9dce791efc86adae50dc55a172446723612d2c3f5052817210f015445cfeb819233b38b17ec37a8ad56a07cd17ffb95fabe2da5929c2697eb0170d87c0cf4c32efe1305e4ee9bf61762088bb7082c6d29533d53dbbde9ea2e466773a8ec6e6fb4de45716c52d6dc23b00d718f46286f148782cdd116d0f2b7763f5befb0d8330e9e18570cec78b6c18f28fe142c96abbaee4f63ab9807a7bb24ead66a64a35c147569f4dc7a8c499756fb65a50de268", 0xf0}, {&(0x7f00000002c0)="19a491b5839e2db77ab8cbfdbeed4903a4c9f806aaec005aa1efcc689d6d5eebf6f7b8e09432f7a6a49d1f5b97d96b9285d9b0ffffae2b", 0x37}, {&(0x7f00000003c0)="efea7ac3b6d1ed3f75c424155dc5abfbbdc5e7546dfefa6cdbb11f359ca906d2fe51fff9ac8d7dc053717d6fb94f3110b02ca89a7bef2fd5c550951c2f1ef05e41869b5720a2b97158327f3699393eba0383e74e2eee804b0f7a5497cc9ae240d5f5661d42b0ccf70642867f9b1adfeda76eef6269f22f686cf2b147d73e091405ad1794b0d2dd76a61151f98f66310dd3bf8144e79ebc4ee521a2e05dcbad86f28eb6ed0dd04b2b1e4cd7", 0xab}, {&(0x7f0000000480)="a82a4a1430d32ebd24a4eaf818b1fc8d7e77caadfb10c1ee6575ae65b880251e895e32ab967db727acd9da895c8241b6931396d8ca048be1c26b36075c68482e8c6cb0bff5e4cebcad541e60bbc1fb6f2b8a57239293d45053dad02c24970cad085b4efecd584cf2485ae6bbf1519edc0d34618d0bf563bf376b980b2ef66e2b8657b0efbdd0d44a825093f90d3441361d940e683786b6d6d54b3df59067366021", 0xa1}, {&(0x7f0000000300)}, {&(0x7f0000000540)="1bd3ec72689b7dc0ee04e901e67ba1480847060c6293fdbbe91826224cde4205d3a09462e1289444f63104341aa402342de734908314c0482b84d800873f4b483be9c9ae4fbfa79a0b37b10969ba3f718d3159757d0ca3513548b97bb6bdb40113b439c714643abbe059b157b73e84108199e28dd4265f1870356ae53962d956325ab84b8b88688e97aecf87a1bf1d0085f8c3aacd41d2c19d", 0x99}], 0x8, &(0x7f0000005040)=[@ip_ttl={{0x14, 0x0, 0x2, 0x34f40000000}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0xc6fe}}}], 0x38}, 0x40) 10:48:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0xffffffffffffff01, 0x80000001, 0x4, 0x0, 0x10001, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 10:48:53 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xfec0000000000000, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) [ 1161.475588][ T5255] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1161.517923][ T5260] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1161.529483][ T5258] device nr0 entered promiscuous mode 10:48:54 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000001b40)='\xbbA \x00\x00\x01\x00Ar\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.co\xd3trollers\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 10:48:54 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000006c0)='cpuacct.usa\x8de_sys4W\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89;\xc0\x88\xbfh>\x93\xdd\xab&\x01\xe9\xb67\x84O\x90\x89kHy\x1dRv\xb0\x009\xc27o?\xf7\x9a\x98\a\x98\xd1\xf6d\xe1\xe41$\xfeRH/w\x02\xb4\x9f!h\x89\x14\x1b\t\x122\x1f)\xb9\xa3*\t\xde\xcau;#L\xb7\x81\xd9\x8c\x8f\x8c\x1c\x18\xefdH9(k\xdc\xbe\xa4\x02?l%\xcc\xcfhm\xed\xb7\nM\xf5\xb2\xc5\xbdP \xaa\xe0\x96\xda~\x87\xcd\x96\xfa\x8a\x88\xb7K\x15\xac\x131\"\xba\x1f\x98\x97bT\xed\'\xf8\xf3d{\xd4\xdcv', 0x26e1, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0xfdf3, 0x4, 0x6, 0x0, 0x0, 0x6, 0x0, 0x4, 0x58d00000, 0x2, 0x2, 0x2, 0x2, 0x3, 0x0, 0xaa7c, 0x7, 0x1f80000, 0x757, 0x5, 0x6a8, 0x400, 0x3, 0x3f, 0x0, 0x4, 0x9, 0x2, 0x8, 0xd92, 0x7a20, 0x8, 0x8, 0x101, 0x1ff, 0x517bbf02, 0x0, 0x6, 0x4, @perf_bp={&(0x7f00000002c0), 0x4}, 0x2000, 0x5e580000000, 0x9, 0x9, 0x9, 0x3ff, 0x7}, r2, 0x6, r0, 0x3) close(r0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f00000004c0)=0x5) close(r1) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000040)) r3 = openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000480)={r3, &(0x7f0000000380)="24b5c022f55537613a268b55c787dca6c9ce61ff0de3220a23e5805b3fd588dab2cbda207e2e150790072aea0456e2d96cf284e975ec3b7dda59e82cdb27ed0faeda2e7e1e62700f77cf82a6eccc3c1ed346d976c890d891c5", &(0x7f0000000400)="98d1ac7ba85d573bdeb0b9b620b9532b698e49dfdd122cb054e2bf0fbdbc6ecb10ef70dbc09b9ff14b2af3ee8981c7cd37ae431f87ca6e0cb667a0ddbfe2f777a080174a500a8baf345d3ac75e84767bc650f649722564", 0x6}, 0x20) close(r1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x2}, 0x0) 10:48:54 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f0000000100)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000300)='gre0\x00') r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x2, 0x8, 0x10000, 0xc74, 0x0, 0x6, 0x100, 0x1, 0x4, 0x3, 0x1ff, 0x100000000, 0x7, 0xfffffffffffffffd, 0x8, 0x5, 0x9, 0x800, 0x8, 0x2, 0xff, 0xa5, 0x5f4, 0x6, 0x6, 0x8000, 0x0, 0x3, 0x1e2, 0x5bc3f7c7, 0x80000001, 0x0, 0x33, 0xffff, 0x80000000, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x1000, 0x4}, 0x84, 0x3, 0x5e9b, 0x7, 0x15d, 0x4, 0x400000}, r2, 0xe, r1, 0x4) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000000)=ANY=[@ANYBLOB="040000000000000000000000000000ed0b6a154f11e21600"]) 10:48:54 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000420081aee405e9a4000000000000c6ff07d800400300"/35, 0x23}], 0x1}, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_type(r1, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffff6, &(0x7f0000000300)=[{&(0x7f00000001c0)=""/101, 0x65}, {&(0x7f0000000280)=""/86, 0xc}, {&(0x7f0000001780)=""/4096, 0x1060}, {&(0x7f0000001300)=""/136, 0x88}, {&(0x7f0000000040)=""/58, 0x468}, {&(0x7f0000001400)=""/233, 0xe9}, {&(0x7f0000001500)=""/252, 0x26a}], 0x5, 0x0, 0x3a}, 0x0) 10:48:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:48:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x4c}]}, &(0x7f0000000100)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 10:48:54 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="2e00000018008102e00f80ecdb4cb92e0a480e181e0cd308e8bd6efb1200090008000a000002a0ffffffff000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000800)={&(0x7f0000000440)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000700)=[{&(0x7f00000004c0)=""/6, 0x6}, {&(0x7f0000000500)=""/148, 0x94}, {&(0x7f00000005c0)=""/39, 0x27}, {&(0x7f0000000600)=""/177, 0xb1}, {&(0x7f00000006c0)=""/51, 0x33}], 0x5, &(0x7f0000000780)=""/66, 0x42}, 0x40002000) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000880)={0x6, 0x0, 0x80000000, 0x6, 0x40102, 0xffffffffffffff9c, 0x1661b2a, [], r1, r2, 0x4, 0x2}, 0x3c) sendmsg$kcm(r0, &(0x7f0000001e40)={&(0x7f00000003c0)=@in6={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x1b}, 0x2}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000900)=[{0x88, 0x100, 0x4, "852e136511d22851726505bb0a0c33128539923476f348d42b6c3784847edcc360338d17ecb6af6d4a648ae8891cf39766287a0923d0c37896bb31990214bd5e4e16e8583d2caf46fd34d6a6892bae02be028a58a6e2ef94b2306928bfcc2f9cfc6cece5ac5a87d376fbcc2bb238ac59ae138066"}, {0x50, 0x105, 0x5, "1406f51baa1cddfd40f2821c4bc700422efe18551906d4e3918c50d991f4b51430a5431858f0addb4cea85c080164252f216295f8fc236e2f6"}, {0x78, 0x10e, 0xfffffffffffffffd, "dc7218be6c5e418f5f8ca2f341e9837b7fb8b0d46b9af30a28d52b39732e4463945b56f1f324555f5e9c2c473c66fa8b5d9c89fdf69a5b23bcd92d6cdfbffcab60fc3c808063d9c5631b6e80f4f89bcc7d748aada80c57532d20a93c382a8a68a3"}, {0xc8, 0x19d, 0x3, "fb89e6673a0b19c75cec38d858e6ee995c1859c1f0420b5f2bbb523497794c57eb81a7c20775e23a7fb2849fc35e07cdc640618685787d2b6f6db4c7e017e1ec1aec740b1fa5e3e3c48aa55ce86cface913baf22650129adb64d8e8a61eab7eaf53826bf12e4a2c9de9431a3a0bcb170734d074d4102648792d27cb88e078b4e19f4314e920e89ba3269838ee4b32125de838c2f6a2ff9fb951f0e44c6bf561319132e9b40fe44545fafee20d75c5ed743e22003"}, {0x1010, 0x1bf, 0x101, "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"}, {0xf0, 0x10e, 0x0, "ae2c9a63441f5ac4a99314ced637976f8ae6d8acc3681376588e4a5e8aa3c0131cb28f51b8ac995d052d22e1e330c66ec5384131c6108be9eb246ff9e42cc26514df66aaf8862755fe1fe504a8f0bb81298373cb55d40a782e2a2313af1ac0958fc080bd58a1c7386bd7520d324a1d07e743c6f440698c4309820579125888f5f40a172672acd5f672e9db957b09899abc9f9967ed0b00b40a89ee2e8ee10b3dc2747a76f6ababea960ea265b393b5568a60656ef58607dd4f3b940084686584d8a503aff75d5df5b0faf367729dda0e7826c33d19b361eb34"}, {0xf8, 0x115, 0x100000001, "7e6803730a6aa266f341b7f39a3e3a2fa2cf6437e71f171c8b5006cd8c4763cd1635c8103ff85759fa375ec54042361c4afa4525abac7e035f6384c02a0c917e70e469fa9756affc04df1821029421caafe5e489fb3340ae761dbad5f9425b093a942507ee64365485bd5db2439afdb476b2d9bda3075f2c51e01e535c9503c0ab29df72e8c2926163049ee86e2d0ab6306d96b6675061dd4ef7f4ee6659eb39afa820b146c36e1e5edf465f802e0d4c637b611ca9d3a70b74598588d1e1ed7fcaf1ff5b33b8354c8a14aba2c6c030ae95862d328d2521a4f8cc81d55b60a8b59789"}, {0x110, 0x77ceb8ac4806cbbc, 0x8, "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"}], 0x1520}, 0x20000004) socket$kcm(0x29, 0x2, 0x0) recvmsg(r0, &(0x7f0000000100)={&(0x7f0000000080)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/195, 0xc3}, {&(0x7f00000002c0)=""/97, 0x61}, {&(0x7f0000000340)=""/100, 0x64}], 0x3}, 0x10000) 10:48:54 executing program 1: openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.events\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0xfffffffffffffffd, 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.usage_percpu\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpuacct.usage_user\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000440)='cpu&5\n\n\n\x00\x06\x00\x05\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05') setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair(0x11, 0x0, 0xfffffffffffffff7, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) getpid() r4 = socket$kcm(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x588}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x8916, &(0x7f0000000000)) 10:48:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_ro(r2, &(0x7f0000000340)='mem\xd5eHMR\x8aX\xa05D\xaa\xf4vents\x00\x00\x00\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000240)=ANY=[]) [ 1162.265673][ T5291] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1162.374739][ T5293] IPv6: NLM_F_CREATE should be specified when creating new route 10:48:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1162.660961][ T5265] device nr0 entered promiscuous mode [ 1163.141646][ T5323] IPVS: ftp: loaded support on port[0] = 21 [ 1163.308669][ T5323] chnl_net:caif_netlink_parms(): no params data found [ 1163.402495][ T5323] bridge0: port 1(bridge_slave_0) entered blocking state [ 1163.410343][ T5323] bridge0: port 1(bridge_slave_0) entered disabled state [ 1163.418573][ T5323] device bridge_slave_0 entered promiscuous mode [ 1163.490840][ T5323] bridge0: port 2(bridge_slave_1) entered blocking state [ 1163.498134][ T5323] bridge0: port 2(bridge_slave_1) entered disabled state [ 1163.506449][ T5323] device bridge_slave_1 entered promiscuous mode [ 1163.530960][ T5323] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1163.541617][ T5323] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1163.551036][ T8983] device bridge_slave_1 left promiscuous mode [ 1163.557812][ T8983] bridge0: port 2(bridge_slave_1) entered disabled state [ 1163.607162][ T8983] device bridge_slave_0 left promiscuous mode [ 1163.613562][ T8983] bridge0: port 1(bridge_slave_0) entered disabled state [ 1165.267778][ T8983] device hsr_slave_1 left promiscuous mode [ 1165.317422][ T8983] device hsr_slave_0 left promiscuous mode [ 1165.359233][ T8983] team0 (unregistering): Port device team_slave_1 removed [ 1165.371641][ T8983] team0 (unregistering): Port device team_slave_0 removed [ 1165.384405][ T8983] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1165.417501][ T8983] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1165.492934][ T8983] bond0 (unregistering): Released all slaves [ 1165.618998][ T5323] team0: Port device team_slave_0 added [ 1165.626197][ T5323] team0: Port device team_slave_1 added [ 1165.696872][ T5323] device hsr_slave_0 entered promiscuous mode [ 1165.743858][ T5323] device hsr_slave_1 entered promiscuous mode [ 1165.822951][ T5323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1165.840834][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1165.850269][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1165.862346][ T5323] 8021q: adding VLAN 0 to HW filter on device team0 [ 1165.873847][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1165.882602][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1165.891572][T26106] bridge0: port 1(bridge_slave_0) entered blocking state [ 1165.898715][T26106] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1165.907471][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1165.918427][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1165.928679][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1165.937372][T10613] bridge0: port 2(bridge_slave_1) entered blocking state [ 1165.944528][T10613] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1165.961055][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1165.970921][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1165.982435][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1165.992245][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1166.050967][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1166.062160][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1166.075738][T15778] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1166.089743][ T5323] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1166.102310][ T5323] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1166.115817][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1166.142867][ T5323] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1166.448830][ T5335] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1166.463763][ T5335] CPU: 1 PID: 5335 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1166.472007][ T5335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1166.482176][ T5335] Call Trace: [ 1166.485948][ T5335] dump_stack+0x172/0x1f0 [ 1166.490898][ T5335] dump_header+0x10f/0xb6c [ 1166.497084][ T5335] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1166.503113][ T5335] ? ___ratelimit+0x60/0x595 [ 1166.507735][ T5335] ? do_raw_spin_unlock+0x57/0x270 [ 1166.512885][ T5335] oom_kill_process.cold+0x10/0x15 [ 1166.518037][ T5335] out_of_memory+0x79a/0x1280 [ 1166.523194][ T5335] ? retint_kernel+0x2b/0x2b [ 1166.527829][ T5335] ? oom_killer_disable+0x280/0x280 [ 1166.533075][ T5335] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1166.538833][ T5335] ? memcg_event_wake+0x230/0x230 [ 1166.543889][ T5335] ? retint_kernel+0x2b/0x2b [ 1166.549062][ T5335] memory_max_write+0x22f/0x390 [ 1166.554093][ T5335] ? mem_cgroup_write+0x360/0x360 [ 1166.559346][ T5335] ? lock_acquire+0x16f/0x3f0 [ 1166.564069][ T5335] ? kernfs_fop_write+0x227/0x480 [ 1166.569137][ T5335] cgroup_file_write+0x241/0x790 [ 1166.574133][ T5335] ? mem_cgroup_write+0x360/0x360 [ 1166.579222][ T5335] ? kill_css+0x380/0x380 [ 1166.583593][ T5335] ? kill_css+0x380/0x380 [ 1166.587965][ T5335] kernfs_fop_write+0x2b8/0x480 [ 1166.592864][ T5335] __vfs_write+0x8a/0x110 [ 1166.597222][ T5335] ? kernfs_fop_open+0xd80/0xd80 [ 1166.602199][ T5335] vfs_write+0x20c/0x580 [ 1166.606657][ T5335] ksys_write+0x14f/0x290 [ 1166.611029][ T5335] ? __ia32_sys_read+0xb0/0xb0 [ 1166.615844][ T5335] ? do_syscall_64+0x26/0x680 [ 1166.620639][ T5335] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1166.626741][ T5335] ? do_syscall_64+0x26/0x680 [ 1166.631554][ T5335] __x64_sys_write+0x73/0xb0 [ 1166.636181][ T5335] do_syscall_64+0xfd/0x680 [ 1166.640813][ T5335] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1166.646729][ T5335] RIP: 0033:0x4592c9 [ 1166.650648][ T5335] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1166.670274][ T5335] RSP: 002b:00007f92d791bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1166.678720][ T5335] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 1166.686716][ T5335] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 1166.694711][ T5335] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1166.702714][ T5335] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f92d791c6d4 [ 1166.710724][ T5335] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 1166.756610][ T5335] memory: usage 5252kB, limit 0kB, failcnt 458499 [ 1166.763308][ T5335] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1166.771558][ T5335] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1166.780348][ T5335] Memory cgroup stats for /syz5: cache:60KB rss:4252KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4252KB inactive_file:116KB active_file:112KB unevictable:0KB [ 1166.802677][ T5335] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=5334,uid=0 [ 1166.819104][ T5335] Memory cgroup out of memory: Killed process 5334 (syz-executor.5) total-vm:72712kB, anon-rss:4236kB, file-rss:35748kB, shmem-rss:0kB [ 1166.841933][ T1044] oom_reaper: reaped process 5334 (syz-executor.5), now anon-rss:0kB, file-rss:34852kB, shmem-rss:0kB 10:48:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:48:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_ro(r2, &(0x7f0000000340)='mem\xd5eHMR\x8aX\xa05D\xaa\xf4vents\x00\x00\x00\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000240)=ANY=[]) 10:48:59 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xfeffffff00000000, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) 10:48:59 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)="c109000000002f00000229e4ac14140de0f499f270a8ca718e5bb7f9d5fb661be6c722d80ad6d11814a60000", 0x2c}], 0x1}, 0x0) 10:48:59 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0xffffffffffffff01, 0x80000001, 0x4, 0x0, 0x10001, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r6 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r4, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r3, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r7 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r7, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r3, 0x0, 0x0) write$cgroup_int(r6, &(0x7f00000003c0)=0x100, 0x12) 10:48:59 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000003400)={0x0, 0x0, &(0x7f00000045c0)=[{&(0x7f0000004600)="278693d709c3f63b97b62e2ea591fbdc638f913ccb167ee5dc5825030ae8e4cf4c664272191086c99f09ba178908a58e318776eb4b8acf39ac81fb365a56f30a1c31adf99f6e34880aea4ed6d2846e65a2ac2d38f78b07178f1dfaad09780cc872951dab314d9b5dd5723f5c339433883164f736017900cb3cb4cd663e0a137c9d999065daffc1c9ea01c2345ab7ef589cc3484db028922609a908b134c3a42ac90f24fdffa8fcf41e8a2504c0b73a72ecf3828225dcbaa8cb24a0e6e8c8ef52", 0xc0}, {&(0x7f0000003500)="9c52b7de8e279c67049e92564f5c28df86781562c892336261baeb567b5f89313f62b013975f4dbedd37467c40b210dd77a9243fcfc47caae5baa5a958c7b3b6f5cdf29b0d30a46a4e7226d430e38d32fe34c9ca559992552fb36c67cfd9fd2bb1e6b4875b20894bc216d2e4fed3e68cf21f431ac694140b3add6a9b810ccf21df08b04dd20118d5b2d1961514191b956e40e3a88dc18894ec693b", 0x9b}, {&(0x7f00000035c0)="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", 0x1000}], 0x3, 0x0, 0xfffffffffffffdae}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="230000004300817491", 0x9}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000003380)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)=""/185, 0xb9}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/183, 0xb7}, {&(0x7f0000000000)=""/65, 0x41}, {&(0x7f0000001380)=""/4096, 0x1000}], 0x5, &(0x7f0000002380)=""/4096, 0x1000}, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000033c0)=0x37, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000034c0)={0x0, 0xffffffffffffff9c, 0x0, 0x6, &(0x7f0000003480)='veth0\x00'}, 0x30) sendmsg(r0, &(0x7f0000005240)={&(0x7f0000004f40)=@un=@abs={0x1, 0x0, 0x4e20}, 0x80, &(0x7f0000003440)=[{&(0x7f0000004fc0)="0b19946fdb5cb1a12a5595daa4269a3a8b2900dd0dbc3a249663ae19538e6aa3b9c0f5fe6a9121e9564185339202565c6392435b7bf8651ab64d3365d7866e829c2b62e3548af2be44ae51dc4ed4ad2f49b1b538164921bd5ff306c4bdf5c250bbf2a2b82971c554142e6568d1c95246b43d7135647dbc0c80d0f19837b839f92384e6204f658470a5e232388a044d315a7c2b2f5034a24195a8fa268edfc16ff30f7b9a220e18ce0df568f7abe5f46595", 0xb1}, {&(0x7f0000005080)="92315856a5f23e0cce26390a48dc67ba622f203c9944ca409b3e55b4d2c02fc0ee26b4b40497ea8f17778f458b669d8d01f18d426b8ee69d39afde8fa77b65ac10bb8351684648c9020ba2af48e4deb7275e93d4ef39b9028e9fc93d5bc1a041fab24c9619e4ba2bbf8ab44e813c58b4b42204e657d7347d260938fcb905e327f672cf4e815b14ec0b783f862758fc2ed13f7b1f60431c67a3af9179f3146fe1d3b5c15c1325cf4f48a7e27e4db3ed456372cc5984694ec333be2f82f124d50b040c41bb609e796ca9a0621b694a1535b5abbb23d796faec92ee5db79319d011d4a3d7aa7f970e286a6b40a050d575fa34f37072a7e3631008e205", 0xfb}], 0x2, &(0x7f0000004cc0)=ANY=[@ANYBLOB="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"], 0x88}, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000047c0)='veth0\x00\xf7\xcd\x9d6\xe4U\xceY\xfd\x84Dx\xe7\x89\x9c\xbcZdV') sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f00000046c0)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-aes-neonbs\x00'}, 0x80, &(0x7f0000004c40)=[{&(0x7f0000004800)="6e5f4bf7df867f4282025b2c0fdc6bc861e959aaa146d9ffb27e3adbe5c2e08cbf0a9c3ff14150fe67dea81031d6e9d00cf0d440a09ca7940b2fc528344b1e75f96fc8695d7c564d71d6433ec7844cc1adc6dde7ba6e65917b3438f28a5e4bbb00ea26d8add9e4179aa9fcbd27d48bf8d5312fea963e40e15a1bc09ae879013a18b22008bf4f81a225f19b5dbae37bd866122434ff091c41e7644facbaff007bf8d8bce5d4be4d51e8f6e02094aad3fb2294cfa4032f9dbc71b2e926b3674b8a6cb37d1e37f5469d44aa1fadae", 0xcd}, {&(0x7f0000004900)="7347894c41a579703435ba2e8d075665707e677e18b26e37363e2f53e0a24bc38865305f96b5ea86788fe66c445721592eaf78c723df449e760c989288b325737d8e9f75e86033653471e518af3d036a62c124dfa5147deecd2c8e3631ff1f6d288d2361f8c0d2155552d8246e062ac38b5ad9383659ce5dc1e229ace37b59baa4417c8c567b87a74a74d1c31002764188c7f27cd7c4ef1b57b92983396da8e8d3773c84a5156a58350a10b7554955833d6b94ad76ba495765bd", 0xba}, {&(0x7f00000049c0)="88b7250382e89fd8f6544ce82f7ae7158df9dca8936800220a28997c86116d80cbc48a3dbc10df01a989a8f01b494007ddcec7c2bc05d0a47a692934c08286a94f6d42570ae96173054f04c4ea34a774628705ad80787f77ff29bee81bbf56ebe86caca94e021315f333a48a0b103c29c1b602a42620afc3c4a4a4a858d485e313d465bf0b69d469830829526639f403700c4f1b32560f88e7a3f62fdf0db32bd1bed768dec546fd06d2dc7c925578ad3bd17a75732cce47d6b4e60d5af0cf8e7590b0d394fc4b78e39ba0dbb9b4caff3c48c81aef385b13d5be09a9a5a1e19f7bcbd72be17293c2b1c3a19992", 0xed}, {&(0x7f0000004740)="19fa67f270b62ec5f613d237de1a428d3f1a617312ac354a1d4f54872ae61a040bfdb095ccec461c2f43c5232b6d416b614ea7a2857a226f889ba4cdb4789ccbcb87c47464", 0x45}, {&(0x7f0000004ac0)="e5c12352ecd8711492d6a3f8f2a69b0fe55bc344f45b6a00aa8985f57812a9b1f5a774f56047ee8af03bee18d2b577889440102337c77a55eb6364856633d6d163441b9a6a2ca5e6fdbdd89673cb23de61811556917f87ed2e9d40193c2aa0cab0204dd37114e8cbee2b8096a47f97b40257d72be90e9abb81372f55cf5dddf96b3d081aabe6361bf8fe59e0a5d2c284325d2c76f3c63527afcfbf5f4c5b202bbc8112ad734b3d7e24b0c557b96421bc473bf27a8ebe501fa3", 0xb9}, {&(0x7f0000004b80)="4fc117a7409f91ce28c8c70e658722f516d2afee980b69240f028949b802a5bb4d4be28f187b1137b1d6ca955ec5a1f1125942c1a3d68e3af5ee7e44e1a3d76f940151e75fa3f25ef737b20a74b45a3cb1e83ad3233ef62e63a42eba6915140f8d9f1c55583cc0802aae48f2b7d08d07dd18eb9f054290a36f475c7c84cce38180d3d881b12dbc9734a548451a75a121954635805a0c3436e4", 0x99}], 0x6, &(0x7f0000005280)=ANY=[@ANYBLOB="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"], 0x258}, 0x4) socket$kcm(0x29, 0x2, 0x0) [ 1167.035249][ T5323] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1167.048321][ T5345] __nla_validate_parse: 2 callbacks suppressed [ 1167.048351][ T5345] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1167.113589][ T5323] CPU: 1 PID: 5323 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1167.121527][ T5323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1167.131614][ T5323] Call Trace: [ 1167.134932][ T5323] dump_stack+0x172/0x1f0 [ 1167.139306][ T5323] dump_header+0x10f/0xb6c [ 1167.143756][ T5323] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1167.149617][ T5323] ? ___ratelimit+0x60/0x595 [ 1167.154245][ T5323] ? do_raw_spin_unlock+0x57/0x270 [ 1167.159395][ T5323] oom_kill_process.cold+0x10/0x15 [ 1167.164535][ T5323] out_of_memory+0x79a/0x1280 [ 1167.169239][ T5323] ? lock_downgrade+0x880/0x880 [ 1167.174125][ T5323] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1167.174148][ T5323] ? oom_killer_disable+0x280/0x280 [ 1167.174160][ T5323] ? find_held_lock+0x35/0x130 [ 1167.174183][ T5323] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1167.174198][ T5323] ? memcg_event_wake+0x230/0x230 [ 1167.174217][ T5323] ? do_raw_spin_unlock+0x57/0x270 [ 1167.174241][ T5323] ? _raw_spin_unlock+0x2d/0x50 [ 1167.201066][ T5323] try_charge+0x1042/0x1410 [ 1167.201092][ T5323] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1167.201113][ T5323] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1167.201130][ T5323] ? kasan_check_read+0x11/0x20 [ 1167.201151][ T5323] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1167.201171][ T5323] mem_cgroup_try_charge+0x24d/0x5e0 [ 1167.201193][ T5323] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1167.211222][ T5323] wp_page_copy+0x416/0x1770 [ 1167.211239][ T5323] ? do_wp_page+0x486/0x1500 [ 1167.211262][ T5323] ? pmd_pfn+0x1d0/0x1d0 [ 1167.211284][ T5323] ? lock_downgrade+0x880/0x880 [ 1167.211300][ T5323] ? swp_swapcount+0x540/0x540 [ 1167.211314][ T5323] ? do_raw_spin_unlock+0x57/0x270 [ 1167.211336][ T5323] ? kasan_check_read+0x11/0x20 [ 1167.221524][ T5323] ? do_raw_spin_unlock+0x57/0x270 [ 1167.221547][ T5323] do_wp_page+0x48e/0x1500 [ 1167.221571][ T5323] ? finish_mkwrite_fault+0x540/0x540 [ 1167.221599][ T5323] __handle_mm_fault+0x22e3/0x3eb0 [ 1167.221620][ T5323] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1167.221642][ T5323] ? find_held_lock+0x35/0x130 10:48:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c00810ce00f80ecdb4cb9f207c804a00d000000880012fb0a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1, 0x0, 0x0, 0x5865}, 0x0) [ 1167.232764][ T5323] ? handle_mm_fault+0x292/0xa90 [ 1167.232793][ T5323] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1167.232811][ T5323] ? kasan_check_read+0x11/0x20 [ 1167.232832][ T5323] handle_mm_fault+0x3b7/0xa90 [ 1167.232853][ T5323] __do_page_fault+0x5ef/0xda0 [ 1167.232885][ T5323] do_page_fault+0x71/0x57d [ 1167.243743][ T5323] ? page_fault+0x8/0x30 [ 1167.243761][ T5323] page_fault+0x1e/0x30 [ 1167.243773][ T5323] RIP: 0033:0x4303a6 [ 1167.243790][ T5323] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 46 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 bc 4b 64 00 85 c0 0f 84 [ 1167.243798][ T5323] RSP: 002b:00007ffccac823a0 EFLAGS: 00010206 [ 1167.243809][ T5323] RAX: 0000000000019691 RBX: 0000000000714640 RCX: 0000000000008041 [ 1167.243816][ T5323] RDX: 0000555557512930 RSI: 000055555751a970 RDI: 0000000000000003 [ 1167.243824][ T5323] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555557511940 [ 1167.243831][ T5323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000714698 [ 1167.243839][ T5323] R13: 0000000000714698 R14: 0000000000000000 R15: 0000000000002710 [ 1167.292374][ T5323] memory: usage 824kB, limit 0kB, failcnt 458507 [ 1167.377949][ T5323] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1167.400053][ T5323] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1167.445336][ T5323] Memory cgroup stats for /syz5: cache:60KB rss:88KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:88KB inactive_file:116KB active_file:112KB unevictable:0KB [ 1167.466449][ T5323] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=5323,uid=0 [ 1167.466611][ T5323] Memory cgroup out of memory: Killed process 5323 (syz-executor.5) total-vm:72448kB, anon-rss:68kB, file-rss:34828kB, shmem-rss:0kB [ 1167.516861][ T5345] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1167.527852][ T5350] device nr0 entered promiscuous mode 10:49:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="fb0000002e000104bfa9d345e7eb8d99c1ffffffffffffff43bc59198183fe204ee2d7080000000600000000000000801d5291d76b8c67452107132daffa33021eb82169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c33b047f720f4e89978112322628c7c1fbab650cdcafa532d3524ea85b198cb49066bf549933875e91431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a861b9390ddbad539ef278168ac8d157a656737a7ac0226d366ccec93f9f070000000000008e9234feee7baa2acd2683d489", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:49:00 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x22f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)) setsockopt$sock_attach_bpf(r1, 0x29, 0x21, &(0x7f0000000c40), 0x4) sendmsg(r1, &(0x7f0000002700)={&(0x7f00000001c0)=@in6={0xa, 0x0, 0xf000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0008000]}, 0x7}, 0x80, &(0x7f0000001640)=[{&(0x7f00000003c0)='\x00', 0x1}], 0x1}, 0x45) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000080)=ANY=[@ANYBLOB="040000000000000000000000000000000000000000000092847c5e6706a300"]) close(r1) [ 1167.741272][ T5361] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:49:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='\x8fv\x8auts\x00\xc4\x91n\xdaK\xcb\x05\xbf\x10\x1f\x10\xcb\tl\xaeD\xb5\xe8\\|\x9a\x8dS\xe3\n\x19\xa5dg\xf2\xde\x8b\x15\xa2\xe2\x97\x81\xd4K\\\xff\xb6\xb7\xef8\xd6X\xb7\x89\xdb\xe3Ru0xffffffffffffffff, r2, 0x0, 0xc, &(0x7f0000000200)='ppp0-cpuset\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x1, 0x40, 0x7e898405, 0x0, 0x9, 0x20, 0x8, 0x7fff, 0xffffffff, 0x5, 0x0, 0x80000001, 0xc8b, 0x1, 0x2, 0x4, 0x9, 0x0, 0x10000, 0x401, 0x1, 0x9, 0x8001, 0xcd3, 0x5, 0x400, 0xfff, 0x4, 0x65, 0x2, 0x9, 0x7, 0x20, 0x3, 0x0, 0x0, 0xd25, 0x1, @perf_config_ext={0x80, 0x7}, 0xea7d8ac7422916c8, 0x0, 0x4, 0x5, 0x1f, 0x8, 0x81}, r3, 0x8, r2, 0xb) 10:49:00 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x22f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)) setsockopt$sock_attach_bpf(r1, 0x29, 0x21, &(0x7f0000000c40), 0x4) sendmsg(r1, &(0x7f0000002700)={&(0x7f00000001c0)=@in6={0xa, 0x0, 0xf000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0008000]}, 0x7}, 0x80, &(0x7f0000001640)=[{&(0x7f00000003c0)='\x00', 0x1}], 0x1}, 0x45) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000080)=ANY=[@ANYBLOB="040000000000000000000000000000000000000000000092847c5e6706a300"]) close(r1) 10:49:00 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) socket$kcm(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000240)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000500)='H', 0x1}], 0x1}, 0xfc) [ 1168.071649][ T5376] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:49:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0xffffffffffffff01, 0x80000001, 0x4, 0x0, 0x10001, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r6 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r4, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r3, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r7 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r7, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r3, 0x0, 0x0) write$cgroup_int(r6, &(0x7f00000003c0)=0x100, 0x12) 10:49:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="fb0000002e000104bfa9d345e7eb8d99c1ffffffffffffff43bc59198183fe204ee2d7080000000600000000000000801d5291d76b8c67452107132daffa33021eb82169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c33b047f720f4e89978112322628c7c1fbab650cdcafa532d3524ea85b198cb49066bf549933875e91431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a861b9390ddbad539ef278168ac8d157a656737a7ac0226d366ccec93f9f070000000000008e9234feee7baa2acd2683d489", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1168.199400][ T5344] device nr0 entered promiscuous mode 10:49:00 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xff00000000000000, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) [ 1168.316132][ T5385] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1168.445584][ T5389] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1168.498093][ T5391] device nr0 entered promiscuous mode 10:49:01 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x48000, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000300)={'ipddp0\x00', @random="fccf1f1a9b0e"}) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() r3 = socket$kcm(0xa, 0x122000000003, 0x11) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x80000001, 0x5, 0x2, 0x7, 0x0, 0xf3, 0x41010, 0x2, 0x0, 0xfffffffffffffffc, 0x7fffffff, 0x9857, 0x1, 0x4, 0x7fffffff, 0x101, 0x9, 0x0, 0x7, 0xffffffffffffff81, 0xe871, 0x8, 0x1, 0xffffffff80000000, 0x2, 0x190f, 0xffffffffffff91c6, 0x1, 0x4, 0x1ff, 0x4, 0x5, 0x3, 0x8, 0x7fffffff, 0x401, 0x0, 0xf513, 0x5, @perf_bp={&(0x7f0000000100), 0x4}, 0x0, 0x7ff, 0x1, 0x0, 0x7fffffff, 0x97f, 0x8}, r2, 0xf, r1, 0x8) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f0000000240), 0x4) sendmsg$kcm(r3, &(0x7f0000000040)={&(0x7f0000000400)=@nl=@unspec={0x48000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000140)="d90d000076862f601c012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7040000", 0x30}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x2000000000004) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000080)={0x0, 0x70, 0x4, 0x9, 0x80000000, 0x5, 0x0, 0x6da, 0x0, 0x1, 0x20, 0x401, 0xffffffff, 0x46, 0x1, 0x81, 0xaa, 0x2, 0x8, 0x8, 0xffffffffffff70bf, 0x8001, 0x3, 0x0, 0x7ff, 0x6, 0x6, 0x63d, 0x80000001, 0x4, 0x1, 0x4, 0xfff, 0x1f, 0x7f, 0x7, 0x101, 0x3, 0x0, 0xffffffff, 0x4, @perf_config_ext={0xfffffffffffffffa, 0x3f}, 0x10400, 0x3, 0x2, 0xf, 0x8, 0x4, 0x9}) 10:49:01 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) close(0xffffffffffffffff) r1 = socket$kcm(0x10, 0x3, 0x10) setsockopt$sock_attach_bpf(r1, 0x10e, 0x2, 0x0, 0x0) close(r1) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x88400, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x8) r3 = getpid() r4 = perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x8, 0x200, 0x5, 0x9, 0x0, 0x10001, 0x40200, 0xa, 0xe5e, 0x9, 0x6, 0x200, 0x548, 0xa51f, 0x6, 0x1ff, 0xffffffffffffeb1f, 0x2, 0x28c9, 0x8, 0x1ff, 0x3, 0x7, 0x8524, 0x7fffffff, 0x200, 0x9, 0x4, 0xfffffffffffffffa, 0x8, 0x6, 0x3, 0x4, 0x5, 0x0, 0x4, 0x0, 0x4, 0x6, @perf_config_ext={0x6, 0x4f}, 0xd2c1, 0x7fffffff, 0xfff, 0xf, 0x922, 0x4, 0x3}, r3, 0x10, r0, 0x2) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x1, 0x0) close(r4) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000200)='cpuacct.usage_sys\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.stat\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, 0x0) 10:49:01 executing program 0: r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000280), 0x4) r1 = perf_event_open$cgroup(&(0x7f0000000200)={0x5, 0x70, 0x10000, 0x7fffffff, 0x5, 0x2, 0x0, 0x76ab, 0x14000, 0x8, 0x6, 0x5, 0x10001, 0x9, 0x10000, 0x1, 0x145237ce, 0x9, 0x1, 0x20, 0x5, 0x1, 0x2, 0x2, 0xff, 0x8000, 0x0, 0x6, 0x7a86, 0xb7f, 0x8, 0x8, 0x8, 0x80000000, 0x1, 0x80000000, 0x4, 0x3, 0x0, 0x8, 0x3, @perf_config_ext={0x2, 0xffff}, 0x400, 0x5, 0x8000, 0x6, 0x3f, 0xffff, 0xce2}, 0xffffffffffffffff, 0x8, 0xffffffffffffff9c, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xffff) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x2004, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0xffffffffffffffff, r1, 0x0, 0x7, &(0x7f0000000300)='wlan1]\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x80000001, 0x40, 0x1a1b, 0x0, 0x0, 0x2, 0x40, 0x1, 0x0, 0x7, 0x9, 0x400, 0x4, 0x100000001, 0x100, 0xce, 0x4, 0x0, 0x0, 0xc0, 0x9, 0x4, 0x3, 0x20, 0x35, 0x1f, 0x4, 0xc188, 0x4, 0x3, 0x3, 0x5, 0x6, 0x4, 0xe00000000, 0x3, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f00000002c0), 0x1}, 0x4, 0x81, 0x13, 0x2, 0xa, 0x7f, 0xffffffffffffff7f}, r3, 0x0, 0xffffffffffffffff, 0x2) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x30000, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x500, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={&(0x7f00000009c0)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000000)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7d8a295b90bf9cc8578ec03a10c48d4050a080a2f858ad2c4aa592d", 0x48}], 0x1}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r4, 0x0, 0xc9, 0xc4, &(0x7f0000000480)="96e8fb4ff47c7d37ea02a51f4c76f83bf0fa5c289323b28705e0f7800a2e40d3c738d6825e79e329ed525e3c53455913df5f0b4711cb5a9c1ed42a9798925e386dea9a09c36112682bad754fa6db432ccc825c82516d00e344c0108dd8581a35d8df52261ec121db9db307023e61d6177aef20bcd02a80a28b5a83bf50dddbfbc950b953f23ec8860ece22ad0b544b0cbe3f2e70f971851ec9e32dcbf3d09bb357d1ad4e171335ed1f21a83159b62ce671fed7cb152d878683a1b36450bd100a7591303eb75b34f71c", &(0x7f0000000580)=""/196, 0x2}, 0x28) 10:49:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:49:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0xffffffffffffff01, 0x80000001, 0x4, 0x0, 0x10001, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r6 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r4, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r3, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r7 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r7, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r3, 0x0, 0x0) write$cgroup_int(r6, &(0x7f00000003c0)=0x100, 0x12) [ 1168.632137][ T5397] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:49:01 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x10000, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000140)=r2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000200)=r2, 0x4) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:49:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:49:01 executing program 2: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x101000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1000000000003, 0x11) r1 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x0, 0x1000, &(0x7f0000000080)) r2 = gettid() perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xff8, 0x10000, 0x5, 0x1f, 0x0, 0x790, 0x80, 0x5, 0xef0624f, 0x2, 0xbdf, 0x5, 0x509, 0x6b40, 0x401, 0x20, 0x9, 0x2, 0x26a, 0x800, 0x7fffffff, 0x67178000000, 0x100000000, 0x0, 0x1, 0x2, 0x7, 0x1f, 0x0, 0xffffffff, 0x2, 0x6, 0x5, 0x6, 0x2, 0x401, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x10000, 0x6, 0x8001, 0x9, 0x7, 0x100000001, 0xf2f}, r2, 0x9, r1, 0x3) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f00000000c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) [ 1168.943057][ T5412] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:49:01 executing program 2: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x101000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1000000000003, 0x11) r1 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x0, 0x1000, &(0x7f0000000080)) r2 = gettid() perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xff8, 0x10000, 0x5, 0x1f, 0x0, 0x790, 0x80, 0x5, 0xef0624f, 0x2, 0xbdf, 0x5, 0x509, 0x6b40, 0x401, 0x20, 0x9, 0x2, 0x26a, 0x800, 0x7fffffff, 0x67178000000, 0x100000000, 0x0, 0x1, 0x2, 0x7, 0x1f, 0x0, 0xffffffff, 0x2, 0x6, 0x5, 0x6, 0x2, 0x401, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x10000, 0x6, 0x8001, 0x9, 0x7, 0x100000001, 0xf2f}, r2, 0x9, r1, 0x3) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f00000000c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) 10:49:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:49:01 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x10000, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000140)=r2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000200)=r2, 0x4) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1169.193228][ T5426] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1169.706509][ T5393] device nr0 entered promiscuous mode 10:49:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="fb0000002e000104bfa9d345e7eb8d99c1ffffffffffffff43bc59198183fe204ee2d7080000000600000000000000801d5291d76b8c67452107132daffa33021eb82169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c33b047f720f4e89978112322628c7c1fbab650cdcafa532d3524ea85b198cb49066bf549933875e91431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a861b9390ddbad539ef278168ac8d157a656737a7ac0226d366ccec93f9f070000000000008e9234feee7baa2acd2683d489", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:49:02 executing program 2: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x101000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1000000000003, 0x11) r1 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x0, 0x1000, &(0x7f0000000080)) r2 = gettid() perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xff8, 0x10000, 0x5, 0x1f, 0x0, 0x790, 0x80, 0x5, 0xef0624f, 0x2, 0xbdf, 0x5, 0x509, 0x6b40, 0x401, 0x20, 0x9, 0x2, 0x26a, 0x800, 0x7fffffff, 0x67178000000, 0x100000000, 0x0, 0x1, 0x2, 0x7, 0x1f, 0x0, 0xffffffff, 0x2, 0x6, 0x5, 0x6, 0x2, 0x401, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x10000, 0x6, 0x8001, 0x9, 0x7, 0x100000001, 0xf2f}, r2, 0x9, r1, 0x3) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f00000000c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) 10:49:02 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x10000, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000140)=r2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000200)=r2, 0x4) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:49:02 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xffffff7f00000000, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) [ 1169.840140][ T5442] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1170.159438][ T5453] device nr0 entered promiscuous mode [ 1170.519495][ T5460] IPVS: ftp: loaded support on port[0] = 21 [ 1170.657565][ T5460] chnl_net:caif_netlink_parms(): no params data found [ 1170.673047][ T8983] device bridge_slave_1 left promiscuous mode [ 1170.682497][ T8983] bridge0: port 2(bridge_slave_1) entered disabled state [ 1170.744814][ T8983] device bridge_slave_0 left promiscuous mode [ 1170.751117][ T8983] bridge0: port 1(bridge_slave_0) entered disabled state [ 1172.535604][ T8983] device hsr_slave_1 left promiscuous mode [ 1172.580170][ T8983] device hsr_slave_0 left promiscuous mode [ 1172.638990][ T8983] team0 (unregistering): Port device team_slave_1 removed [ 1172.651464][ T8983] team0 (unregistering): Port device team_slave_0 removed [ 1172.664811][ T8983] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1172.707850][ T8983] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1172.803718][ T8983] bond0 (unregistering): Released all slaves [ 1172.924597][ T5460] bridge0: port 1(bridge_slave_0) entered blocking state [ 1172.931756][ T5460] bridge0: port 1(bridge_slave_0) entered disabled state [ 1172.941416][ T5460] device bridge_slave_0 entered promiscuous mode [ 1172.950375][ T5460] bridge0: port 2(bridge_slave_1) entered blocking state [ 1172.957651][ T5460] bridge0: port 2(bridge_slave_1) entered disabled state [ 1172.966150][ T5460] device bridge_slave_1 entered promiscuous mode [ 1173.022665][ T5460] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1173.035256][ T5460] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1173.106103][ T5460] team0: Port device team_slave_0 added [ 1173.119060][ T5460] team0: Port device team_slave_1 added [ 1173.187051][ T5460] device hsr_slave_0 entered promiscuous mode [ 1173.233935][ T5460] device hsr_slave_1 entered promiscuous mode [ 1173.293030][ T5460] bridge0: port 2(bridge_slave_1) entered blocking state [ 1173.300319][ T5460] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1173.307848][ T5460] bridge0: port 1(bridge_slave_0) entered blocking state [ 1173.315029][ T5460] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1173.377053][ T5460] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1173.392499][T15778] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1173.402485][T15778] bridge0: port 1(bridge_slave_0) entered disabled state [ 1173.412033][T15778] bridge0: port 2(bridge_slave_1) entered disabled state [ 1173.421765][T15778] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1173.447181][ T5460] 8021q: adding VLAN 0 to HW filter on device team0 [ 1173.460363][ T8936] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1173.470222][ T8936] bridge0: port 1(bridge_slave_0) entered blocking state [ 1173.477397][ T8936] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1173.498271][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1173.507207][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 1173.514349][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1173.537112][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1173.546767][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1173.564613][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1173.573153][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1173.604253][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1173.615330][ T5460] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1173.642426][ T5460] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1173.868437][ T5469] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1173.879812][ T5469] CPU: 1 PID: 5469 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1173.887739][ T5469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1173.897823][ T5469] Call Trace: [ 1173.901149][ T5469] dump_stack+0x172/0x1f0 [ 1173.905517][ T5469] dump_header+0x10f/0xb6c [ 1173.910055][ T5469] ? oom_kill_process+0x94/0x3f0 [ 1173.915035][ T5469] oom_kill_process.cold+0x10/0x15 [ 1173.920177][ T5469] out_of_memory+0x79a/0x1280 [ 1173.924889][ T5469] ? retint_kernel+0x2b/0x2b [ 1173.929532][ T5469] ? oom_killer_disable+0x280/0x280 [ 1173.934975][ T5469] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1173.940557][ T5469] ? memcg_event_wake+0x230/0x230 [ 1173.945626][ T5469] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1173.951478][ T5469] ? cgroup_file_notify+0x140/0x1b0 [ 1173.956726][ T5469] memory_max_write+0x22f/0x390 [ 1173.961630][ T5469] ? mem_cgroup_write+0x360/0x360 [ 1173.966705][ T5469] ? lock_acquire+0x16f/0x3f0 [ 1173.971502][ T5469] ? kernfs_fop_write+0x227/0x480 [ 1173.976674][ T5469] cgroup_file_write+0x241/0x790 [ 1173.981643][ T5469] ? mem_cgroup_write+0x360/0x360 [ 1173.986697][ T5469] ? kill_css+0x380/0x380 [ 1173.991076][ T5469] ? kill_css+0x380/0x380 [ 1173.995445][ T5469] kernfs_fop_write+0x2b8/0x480 [ 1174.000341][ T5469] __vfs_write+0x8a/0x110 [ 1174.004788][ T5469] ? kernfs_fop_open+0xd80/0xd80 [ 1174.009754][ T5469] vfs_write+0x20c/0x580 [ 1174.014027][ T5469] ksys_write+0x14f/0x290 [ 1174.018386][ T5469] ? __ia32_sys_read+0xb0/0xb0 [ 1174.023182][ T5469] ? do_syscall_64+0x26/0x680 [ 1174.027885][ T5469] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1174.033977][ T5469] ? do_syscall_64+0x26/0x680 [ 1174.038694][ T5469] __x64_sys_write+0x73/0xb0 [ 1174.043325][ T5469] do_syscall_64+0xfd/0x680 [ 1174.047869][ T5469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1174.053963][ T5469] RIP: 0033:0x4592c9 [ 1174.057878][ T5469] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1174.077591][ T5469] RSP: 002b:00007fc3b6b18c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1174.086020][ T5469] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 1174.094769][ T5469] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 1174.102941][ T5469] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1174.112175][ T5469] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc3b6b196d4 [ 1174.120171][ T5469] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 1174.142264][ T5469] memory: usage 5256kB, limit 0kB, failcnt 458508 [ 1174.150025][ T5469] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1174.159741][ T5469] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1174.179938][ T5469] Memory cgroup stats for /syz5: cache:60KB rss:4240KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4240KB inactive_file:116KB active_file:112KB unevictable:0KB [ 1174.222231][ T5469] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=5467,uid=0 [ 1174.245719][ T5469] Memory cgroup out of memory: Killed process 5467 (syz-executor.5) total-vm:72580kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB [ 1174.265126][ T1044] oom_reaper: reaped process 5467 (syz-executor.5), now anon-rss:0kB, file-rss:34788kB, shmem-rss:0kB 10:49:06 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='+rd'], 0x3) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) r3 = gettid() perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x3, 0x3, 0x9, 0xf3, 0x0, 0x7, 0x0, 0x3, 0x5, 0x8, 0x1e6, 0x80000001, 0xfff, 0xa7e, 0x7f, 0x80000001, 0xfb, 0x576, 0x0, 0x3, 0x3f, 0x8000, 0x4, 0x4, 0x5, 0x2, 0xffffffff, 0x0, 0x91c0, 0x9, 0x6, 0x2, 0x9, 0x61b, 0x401, 0xff, 0x0, 0x3, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}, 0x180, 0x40, 0x80000001, 0x0, 0x3, 0x7, 0x3}, r3, 0x9, r2, 0x8) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000040)='nr0\x01:\xf2.\xa3\'>\xf8]\x81$?\xfa\xbf1UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa4%\xf4\x94\xa8>\xb1\xb1\xa2_&') 10:49:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r0, 0x1, 0x2f, &(0x7f00000001c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) socket$kcm(0x29, 0x2, 0x0) 10:49:06 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x10000, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000140)=r2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000200)=r2, 0x4) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:49:06 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r6 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r4, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r3, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r7 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r7, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r3, 0x0, 0x0) write$cgroup_int(r6, &(0x7f00000003c0)=0x100, 0x12) 10:49:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:49:07 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xffffffff00000000, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) [ 1174.568000][ T5460] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1174.590685][ T5475] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1174.606951][ T5460] CPU: 0 PID: 5460 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1174.615074][ T5460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1174.625143][ T5460] Call Trace: [ 1174.628457][ T5460] dump_stack+0x172/0x1f0 [ 1174.632824][ T5460] dump_header+0x10f/0xb6c [ 1174.637299][ T5460] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1174.637316][ T5460] ? ___ratelimit+0x60/0x595 [ 1174.637330][ T5460] ? do_raw_spin_unlock+0x57/0x270 [ 1174.637347][ T5460] oom_kill_process.cold+0x10/0x15 [ 1174.637364][ T5460] out_of_memory+0x79a/0x1280 [ 1174.637380][ T5460] ? lock_downgrade+0x880/0x880 [ 1174.637395][ T5460] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1174.637418][ T5460] ? oom_killer_disable+0x280/0x280 [ 1174.680408][ T5460] ? find_held_lock+0x35/0x130 [ 1174.685624][ T5460] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1174.691386][ T5460] ? memcg_event_wake+0x230/0x230 [ 1174.696475][ T5460] ? do_raw_spin_unlock+0x57/0x270 [ 1174.701617][ T5460] ? _raw_spin_unlock+0x2d/0x50 [ 1174.706510][ T5460] try_charge+0x1042/0x1410 [ 1174.711084][ T5460] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1174.716682][ T5460] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1174.722965][ T5460] ? kasan_check_read+0x11/0x20 [ 1174.727947][ T5460] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1174.733622][ T5460] mem_cgroup_try_charge+0x24d/0x5e0 [ 1174.739143][ T5460] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1174.744815][ T5460] wp_page_copy+0x416/0x1770 [ 1174.749441][ T5460] ? do_wp_page+0x486/0x1500 [ 1174.754063][ T5460] ? pmd_pfn+0x1d0/0x1d0 [ 1174.758368][ T5460] ? lock_downgrade+0x880/0x880 [ 1174.763355][ T5460] ? swp_swapcount+0x540/0x540 [ 1174.768156][ T5460] ? do_raw_spin_unlock+0x57/0x270 [ 1174.773304][ T5460] ? kasan_check_read+0x11/0x20 [ 1174.778200][ T5460] ? do_raw_spin_unlock+0x57/0x270 [ 1174.783351][ T5460] do_wp_page+0x48e/0x1500 [ 1174.787812][ T5460] ? finish_mkwrite_fault+0x540/0x540 [ 1174.793229][ T5460] __handle_mm_fault+0x22e3/0x3eb0 [ 1174.798466][ T5460] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1174.804035][ T5460] ? find_held_lock+0x35/0x130 [ 1174.808829][ T5460] ? handle_mm_fault+0x292/0xa90 [ 1174.813982][ T5460] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1174.820352][ T5460] ? kasan_check_read+0x11/0x20 [ 1174.825239][ T5460] handle_mm_fault+0x3b7/0xa90 [ 1174.830048][ T5460] __do_page_fault+0x5ef/0xda0 [ 1174.834879][ T5460] do_page_fault+0x71/0x57d [ 1174.839886][ T5460] ? page_fault+0x8/0x30 [ 1174.844171][ T5460] page_fault+0x1e/0x30 [ 1174.848436][ T5460] RIP: 0033:0x4303a6 [ 1174.852350][ T5460] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 46 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 bc 4b 64 00 85 c0 0f 84 [ 1174.871969][ T5460] RSP: 002b:00007ffc82557300 EFLAGS: 00010206 [ 1174.878059][ T5460] RAX: 0000000000019691 RBX: 0000000000714640 RCX: 0000000000008041 [ 1174.886077][ T5460] RDX: 0000555556cac930 RSI: 0000555556cb4970 RDI: 0000000000000003 [ 1174.894067][ T5460] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555556cab940 [ 1174.902075][ T5460] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000714698 [ 1174.910157][ T5460] R13: 0000000000714698 R14: 0000000000000000 R15: 0000000000002710 [ 1174.937248][ T5478] device nr0 entered promiscuous mode [ 1174.952059][ T5460] memory: usage 872kB, limit 0kB, failcnt 458516 [ 1174.974019][ T5460] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 10:49:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1174.981790][ T5460] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1174.997099][ T5460] Memory cgroup stats for /syz5: cache:60KB rss:56KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:56KB inactive_file:116KB active_file:112KB unevictable:0KB [ 1175.032739][ T5460] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=5460,uid=0 [ 1175.062933][ T5485] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:49:07 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x10000, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000140)=r2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000200)=r2, 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1175.083632][ T5460] Memory cgroup out of memory: Killed process 5460 (syz-executor.5) total-vm:72448kB, anon-rss:68kB, file-rss:34828kB, shmem-rss:0kB [ 1175.104765][ T1044] oom_reaper: reaped process 5460 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 10:49:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:49:07 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x10000, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000140)=r2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000200)=r2, 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1175.259449][ T5494] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:49:07 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x10000, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000140)=r2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000200)=r2, 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:49:07 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="fb0000002e000104bfa9d345e7eb8d99c1ffffffffffffff43bc59198183fe204ee2d7080000000600000000000000801d5291d76b8c67452107132daffa33021eb82169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c33b047f720f4e89978112322628c7c1fbab650cdcafa532d3524ea85b198cb49066bf549933875e91431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a861b9390ddbad539ef278168ac8d157a656737a7ac0226d366ccec93f9f070000000000008e9234feee7baa2acd2683d489", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1175.570054][ T5506] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1175.612432][ T5507] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:49:08 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r6 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r4, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r3, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r7 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r7, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r3, 0x0, 0x0) write$cgroup_int(r6, &(0x7f00000003c0)=0x100, 0x12) 10:49:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:49:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000240)=@in6={0x2, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0000000]}}, 0x80, &(0x7f0000000340), 0x0, &(0x7f0000000180)}, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)=0x3, 0x4) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000000c0)={r0, r3}) perf_event_open(0x0, r2, 0x5, 0xffffffffffffff9c, 0x0) 10:49:08 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x10000, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000140)=r2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1175.729448][ T5478] device nr0 entered promiscuous mode [ 1175.750273][ T5511] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:49:08 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000a40)={'veth0_to_ed\xff\xff\xff\xf8\x00', 0x1}) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000000840)={&(0x7f0000000500)=@xdp, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000580)=""/7, 0x7}, {&(0x7f0000000a80)=""/69, 0x45}, {&(0x7f0000000b00)=""/178, 0xb2}], 0x3, &(0x7f0000000bc0)=""/187, 0xbb}, 0x100) r3 = socket$kcm(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) socketpair(0x2000000f, 0x80000, 0x2, &(0x7f0000000340)={0xffffffffffffffff}) r5 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r5) ioctl$TUNSETPERSIST(r5, 0x400454cb, 0x1) recvmsg$kcm(r3, 0x0, 0x10120) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x7f) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40042409, 0x0) r7 = gettid() write$cgroup_pid(r6, &(0x7f0000000880)=r7, 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(r5, 0x800454cf, &(0x7f0000000100)) r8 = openat$cgroup_ro(r2, &(0x7f0000000240)='/grou\\.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r8, &(0x7f0000000080), 0x297ef) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000c80)=ANY=[@ANYBLOB="f1ffffffffffffaeddbea2f7ea592ad3d0208cc69a0936019f9398f024230bbcc1e29edc045d8cde9d3bb83f089f6eac620e918d64f22277393c25a100b6ecada31cabcf9d5e7f1988d9172428d252c7a0551b"]) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r4, &(0x7f0000000300)={0x0, 0x15b, &(0x7f00000009c0)=[{&(0x7f0000000480)=""/70, 0x46}], 0x1, &(0x7f00000008c0)=""/236, 0xec}, 0xfd) sendmsg$tipc(r5, &(0x7f00000007c0)={&(0x7f0000000600)=@id={0x1e, 0x3, 0x0, {0x4e23, 0x2}}, 0x10, &(0x7f0000000780)=[{&(0x7f0000000640)="2eec61af29f3ebd3c446e1e496d4203034590461aece92ce5e0190dc75e04d", 0x1f}, {&(0x7f0000000680)="62fec006c88e64f79fc75ff2559dfaeabe9d1d2446a25e293e6969136b30b2cee84851d01f9e25d962102788fdae499b264c91f0c43b00abe649983c81dd1bebb1083b56a045df222b52c86c1aa1a6629ffded8a4a92a9e69c8807d1976ea0b8d96035e82f439597a25ec35fdd69d5723379094bbcffcac273bb29c45222828cae329798dd4a12d1afcfc8cae8d39da4cd21106ab5467670dc1896eecc7980cc277d1b112d48a69cd568134433ae4ee83b67aee6d4952e2b821cc8b397a6728aeb07e0504e222a533dad53c29779292f040c4b10409a317aeba34b4de9637829c6704492f3f870c4ca7c", 0xea}], 0x2, 0x0, 0x0, 0x80}, 0x4000) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x2) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x1, 0x100000000, 0x401, 0x0, 0x12000000000, 0x8000, 0x0, 0x20, 0x200, 0x100, 0x9, 0x17, 0x7, 0x5, 0x2, 0x7, 0x9, 0x8001, 0x2, 0xffffffff80000000, 0xf99b, 0xfff, 0x7, 0x8, 0x9, 0x10001, 0x4, 0x200, 0x7, 0x5, 0x7f, 0x55e, 0x4, 0x2, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x2, 0x1}, 0x4000, 0x38, 0x8001, 0x3, 0x7, 0x9, 0x7}, 0x0, 0xc, r8, 0x8) [ 1176.448534][ T5511] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:49:09 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xffffffffa0010000, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) 10:49:09 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x10000, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000140)=r2) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:49:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x18, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) 10:49:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="fb0000002e000104bfa9d345e7eb8d99c1ffffffffffffff43bc59198183fe204ee2d7080000000600000000000000801d5291d76b8c67452107132daffa33021eb82169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c33b047f720f4e89978112322628c7c1fbab650cdcafa532d3524ea85b198cb49066bf549933875e91431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a861b9390ddbad539ef278168ac8d157a656737a7ac0226d366ccec93f9f070000000000008e9234feee7baa2acd2683d489", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:49:09 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuset.effective_cpus\x00', 0x0, 0x0) openat$cgroup(r0, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000280)={0x2, 0x70, 0x1f, 0x6, 0x8, 0x0, 0x0, 0x1, 0x400, 0x0, 0x0, 0xf3b, 0x1, 0x9, 0x80000001, 0x2b600000000000, 0x1f, 0x400, 0x9, 0x1, 0x80, 0x8, 0x4, 0x3, 0x1, 0x8001, 0x100, 0x7944, 0x10000, 0xffffffffffffffff, 0x57c, 0x9, 0x15, 0x39a6, 0x63f, 0x100000001, 0x2, 0x101, 0x0, 0x5, 0x2, @perf_config_ext={0x9, 0x6}, 0x400, 0xffffffffffffffff, 0x7, 0xa, 0x66e8, 0x100000000}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="2f637075202b727009a4006d656d6f7279203f7264000100009315d2dbc111598d3b656d6f72792006804b4a926db233c6cc7400101de78d08ca90b67298c451"], 0x40) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffffffffffeea) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0xcbaa60f5) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x3) 10:49:09 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x10000, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000140)=r2) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1176.730077][ T5537] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:49:09 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x10000, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000140)=r2) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1177.004526][ T5544] device nr0 entered promiscuous mode [ 1177.021573][ T5552] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1177.555763][ T5563] IPVS: ftp: loaded support on port[0] = 21 [ 1177.671323][ T5536] device nr0 entered promiscuous mode [ 1177.783180][ T5563] chnl_net:caif_netlink_parms(): no params data found [ 1177.910006][ T5563] bridge0: port 1(bridge_slave_0) entered blocking state [ 1177.917945][ T5563] bridge0: port 1(bridge_slave_0) entered disabled state [ 1177.926895][ T5563] device bridge_slave_0 entered promiscuous mode [ 1177.935519][ T5563] bridge0: port 2(bridge_slave_1) entered blocking state [ 1177.942658][ T5563] bridge0: port 2(bridge_slave_1) entered disabled state [ 1177.951466][ T5563] device bridge_slave_1 entered promiscuous mode [ 1177.970758][ T8983] device bridge_slave_1 left promiscuous mode [ 1177.978671][ T8983] bridge0: port 2(bridge_slave_1) entered disabled state [ 1178.024807][ T8983] device bridge_slave_0 left promiscuous mode [ 1178.032023][ T8983] bridge0: port 1(bridge_slave_0) entered disabled state [ 1179.716682][ T8983] device hsr_slave_1 left promiscuous mode [ 1179.779568][ T8983] device hsr_slave_0 left promiscuous mode [ 1179.819376][ T8983] team0 (unregistering): Port device team_slave_1 removed [ 1179.831421][ T8983] team0 (unregistering): Port device team_slave_0 removed [ 1179.843234][ T8983] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1179.888344][ T8983] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1179.972564][ T8983] bond0 (unregistering): Released all slaves [ 1180.060179][ T5563] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1180.071221][ T5563] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1180.093812][ T5563] team0: Port device team_slave_0 added [ 1180.101660][ T5563] team0: Port device team_slave_1 added [ 1180.156583][ T5563] device hsr_slave_0 entered promiscuous mode [ 1180.193826][ T5563] device hsr_slave_1 entered promiscuous mode [ 1180.297099][ T5563] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1180.312349][T15778] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1180.321102][T15778] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1180.333586][ T5563] 8021q: adding VLAN 0 to HW filter on device team0 [ 1180.403255][T15778] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1180.412852][T15778] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1180.421634][T15778] bridge0: port 1(bridge_slave_0) entered blocking state [ 1180.428793][T15778] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1180.446050][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1180.454739][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1180.463766][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1180.472461][T26106] bridge0: port 2(bridge_slave_1) entered blocking state [ 1180.479739][T26106] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1180.489669][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1180.517106][ T8978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1180.528290][ T8978] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1180.537866][ T8978] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1180.549600][ T8978] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1180.564662][ T5563] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1180.582843][ T5563] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1180.592517][T15778] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1180.607738][T15778] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1180.646806][ T5563] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1180.998444][ T5572] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1181.009846][ T5572] CPU: 1 PID: 5572 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1181.017785][ T5572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1181.028642][ T5572] Call Trace: [ 1181.032063][ T5572] dump_stack+0x172/0x1f0 [ 1181.036608][ T5572] dump_header+0x10f/0xb6c [ 1181.041059][ T5572] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1181.046988][ T5572] ? ___ratelimit+0x60/0x595 [ 1181.053101][ T5572] ? do_raw_spin_unlock+0x57/0x270 [ 1181.058525][ T5572] oom_kill_process.cold+0x10/0x15 [ 1181.063703][ T5572] out_of_memory+0x79a/0x1280 [ 1181.068425][ T5572] ? retint_kernel+0x2b/0x2b [ 1181.073142][ T5572] ? oom_killer_disable+0x280/0x280 [ 1181.078386][ T5572] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1181.083970][ T5572] ? memcg_event_wake+0x230/0x230 [ 1181.089033][ T5572] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1181.094903][ T5572] ? cgroup_file_notify+0x140/0x1b0 [ 1181.100526][ T5572] memory_max_write+0x22f/0x390 [ 1181.105422][ T5572] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1181.111100][ T5572] ? mem_cgroup_write+0x360/0x360 [ 1181.116166][ T5572] ? lock_acquire+0x16f/0x3f0 [ 1181.120873][ T5572] ? kernfs_fop_write+0x227/0x480 [ 1181.125958][ T5572] cgroup_file_write+0x241/0x790 [ 1181.131027][ T5572] ? mem_cgroup_write+0x360/0x360 [ 1181.136104][ T5572] ? kill_css+0x380/0x380 [ 1181.140478][ T5572] ? kill_css+0x380/0x380 [ 1181.144879][ T5572] kernfs_fop_write+0x2b8/0x480 [ 1181.149759][ T5572] __vfs_write+0x8a/0x110 [ 1181.154114][ T5572] ? kernfs_fop_open+0xd80/0xd80 [ 1181.159077][ T5572] vfs_write+0x20c/0x580 [ 1181.163346][ T5572] ksys_write+0x14f/0x290 [ 1181.167801][ T5572] ? __ia32_sys_read+0xb0/0xb0 [ 1181.172606][ T5572] ? do_syscall_64+0x26/0x680 [ 1181.178353][ T5572] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1181.184448][ T5572] ? do_syscall_64+0x26/0x680 [ 1181.189479][ T5572] __x64_sys_write+0x73/0xb0 [ 1181.194107][ T5572] do_syscall_64+0xfd/0x680 [ 1181.199014][ T5572] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1181.204931][ T5572] RIP: 0033:0x4592c9 [ 1181.209083][ T5572] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1181.229255][ T5572] RSP: 002b:00007f9347985c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1181.238395][ T5572] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 1181.246392][ T5572] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 1181.254571][ T5572] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1181.262562][ T5572] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93479866d4 [ 1181.270576][ T5572] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 1181.282284][ T5572] memory: usage 5260kB, limit 0kB, failcnt 458517 [ 1181.289311][ T5572] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1181.298035][ T5572] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1181.306179][ T5572] Memory cgroup stats for /syz5: cache:60KB rss:4160KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4160KB inactive_file:116KB active_file:112KB unevictable:0KB [ 1181.329057][ T5572] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=5571,uid=0 [ 1181.346862][ T5572] Memory cgroup out of memory: Killed process 5571 (syz-executor.5) total-vm:72580kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB [ 1181.371980][ T1044] oom_reaper: reaped process 5571 (syz-executor.5), now anon-rss:0kB, file-rss:34788kB, shmem-rss:0kB 10:49:14 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r6 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r4, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r3, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r7 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r7, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r3, 0x0, 0x0) write$cgroup_int(r6, &(0x7f00000003c0)=0x100, 0x12) 10:49:14 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xffffffffa0020000, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) 10:49:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x7, 0x3}, 0x0, 0x0, &(0x7f0000000200)={0x3, 0xd, 0x6, 0xfffffffffffffffa}, &(0x7f0000000240)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x3}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)=r1, 0x4) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000080)=0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) r2 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f00000001c0)='veth0\x00') close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 10:49:14 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x10000, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:49:14 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000200)=""/106, 0x6a}, {&(0x7f0000000280)=""/85, 0x55}, {&(0x7f0000000480)=""/59, 0x3b}], 0x3, &(0x7f00000005c0)}, 0x20) close(r2) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f00000000c0)) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNGETFILTER(r3, 0x801054db, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r7, 0x400454cd, 0x200000007) write$cgroup_int(r6, &(0x7f0000000000)=0x1, 0xfdef) close(r6) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETLINK(r3, 0x400454cd, 0x337) r8 = gettid() perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x5, 0x14, 0x5, 0x1ff, 0x0, 0x1, 0x10200, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x642, 0x0, 0x0, 0x2, 0x3, 0x1ff, 0x3, 0xc3b, 0x7, 0x5a81, 0x4, 0x13, 0x400, 0x43f2da42, 0x62fb, 0x54ab, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x4, @perf_bp={0x0}, 0x0, 0xb, 0x8, 0x7, 0x0, 0x8, 0x20}, r8, 0x0, r0, 0x2) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) 10:49:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1181.596915][ T5563] syz-executor.5 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=0, oom_score_adj=0 [ 1181.617785][ T5563] CPU: 1 PID: 5563 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1181.625721][ T5563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1181.635793][ T5563] Call Trace: [ 1181.639214][ T5563] dump_stack+0x172/0x1f0 [ 1181.643892][ T5563] dump_header+0x10f/0xb6c [ 1181.648453][ T5563] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1181.654563][ T5563] ? ___ratelimit+0x60/0x595 [ 1181.659361][ T5563] ? do_raw_spin_unlock+0x57/0x270 [ 1181.664509][ T5563] oom_kill_process.cold+0x10/0x15 [ 1181.669657][ T5563] out_of_memory+0x79a/0x1280 [ 1181.674367][ T5563] ? lock_downgrade+0x880/0x880 [ 1181.679246][ T5563] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1181.685544][ T5563] ? oom_killer_disable+0x280/0x280 [ 1181.690857][ T5563] ? find_held_lock+0x35/0x130 [ 1181.695668][ T5563] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1181.701253][ T5563] ? memcg_event_wake+0x230/0x230 [ 1181.706342][ T5563] ? do_raw_spin_unlock+0x57/0x270 [ 1181.711491][ T5563] ? _raw_spin_unlock+0x2d/0x50 [ 1181.716379][ T5563] try_charge+0x1042/0x1410 [ 1181.720919][ T5563] ? should_fail+0x1de/0x852 [ 1181.725558][ T5563] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1181.731181][ T5563] ? rcu_read_lock_sched_held+0x110/0x130 [ 1181.736935][ T5563] ? __alloc_pages_nodemask+0x61b/0x8d0 [ 1181.742527][ T5563] __memcg_kmem_charge_memcg+0x7c/0x130 [ 1181.748114][ T5563] ? memcg_kmem_put_cache+0xb0/0xb0 [ 1181.753335][ T5563] ? cache_grow_begin+0x3d6/0x650 [ 1181.758655][ T5563] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1181.764073][ T5563] ? trace_hardirqs_on+0x67/0x220 [ 1181.769483][ T5563] cache_grow_begin+0x402/0x650 [ 1181.774359][ T5563] ? __cpuset_node_allowed+0x136/0x540 [ 1181.779865][ T5563] fallback_alloc+0x1fd/0x2d0 [ 1181.784579][ T5563] ____cache_alloc_node+0x1be/0x1e0 [ 1181.790149][ T5563] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1181.796438][ T5563] kmem_cache_alloc+0x1e8/0x6f0 [ 1181.801316][ T5563] ? stack_trace_save+0xac/0xe0 [ 1181.806485][ T5563] __alloc_file+0x27/0x300 [ 1181.810947][ T5563] alloc_empty_file+0x72/0x170 [ 1181.815758][ T5563] path_openat+0xef/0x46d0 [ 1181.820197][ T5563] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1181.826031][ T5563] ? __lock_acquire+0x54f/0x5490 [ 1181.830999][ T5563] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1181.837098][ T5563] ? mark_held_locks+0xf0/0xf0 [ 1181.841989][ T5563] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1181.847394][ T5563] ? cache_grow_end+0xa4/0x190 [ 1181.852194][ T5563] ? __alloc_fd+0x44d/0x560 [ 1181.856736][ T5563] do_filp_open+0x1a1/0x280 [ 1181.861263][ T5563] ? may_open_dev+0x100/0x100 [ 1181.865967][ T5563] ? lock_downgrade+0x880/0x880 [ 1181.870849][ T5563] ? kasan_check_read+0x11/0x20 [ 1181.875726][ T5563] ? do_raw_spin_unlock+0x57/0x270 [ 1181.880886][ T5563] ? _raw_spin_unlock+0x2d/0x50 [ 1181.886043][ T5563] ? __alloc_fd+0x44d/0x560 [ 1181.890605][ T5563] do_sys_open+0x3fe/0x5d0 [ 1181.895058][ T5563] ? filp_open+0x80/0x80 [ 1181.899326][ T5563] ? __detach_mounts+0x320/0x320 [ 1181.904334][ T5563] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1181.909907][ T5563] ? do_syscall_64+0x26/0x680 [ 1181.914614][ T5563] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1181.921401][ T5563] ? do_syscall_64+0x26/0x680 [ 1181.926297][ T5563] __x64_sys_open+0x7e/0xc0 [ 1181.930821][ T5563] do_syscall_64+0xfd/0x680 [ 1181.935350][ T5563] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1181.941261][ T5563] RIP: 0033:0x457240 [ 1181.945166][ T5563] Code: 31 c0 e9 45 ff ff ff 0f 1f 00 80 3f 00 0f 84 f7 00 00 00 55 53 b9 02 00 00 00 be 00 08 09 00 89 c8 48 81 ec 98 00 00 00 0f 05 <48> 3d 00 f0 ff ff 48 89 c3 0f 87 e9 00 00 00 85 db 0f 88 2f 01 00 [ 1181.965127][ T5563] RSP: 002b:00007ffdb4ef67d0 EFLAGS: 00000202 ORIG_RAX: 0000000000000002 [ 1181.973558][ T5563] RAX: ffffffffffffffda RBX: 00000000001204dd RCX: 0000000000457240 [ 1181.981812][ T5563] RDX: 000000000000000c RSI: 0000000000090800 RDI: 00007ffdb4ef79b0 [ 1181.989836][ T5563] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000555555bd1940 [ 1181.998092][ T5563] R10: 0000000000000000 R11: 0000000000000202 R12: 00007ffdb4ef79b0 [ 1182.006079][ T5563] R13: 00007ffdb4ef79a0 R14: 0000000000000000 R15: 00007ffdb4ef79b0 [ 1182.023493][ T5563] memory: usage 876kB, limit 0kB, failcnt 458529 [ 1182.029956][ T5563] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 10:49:14 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x10000, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1182.070613][ T5563] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1182.073388][ T5582] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1182.086825][ T5563] Memory cgroup stats for /syz5: cache:60KB rss:60KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:60KB inactive_file:116KB active_file:112KB unevictable:0KB [ 1182.184101][ T5584] device nr0 entered promiscuous mode [ 1182.186498][ T5563] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=5563,uid=0 [ 1182.205505][ T5586] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:49:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="fb0000002e000104bfa9d345e7eb8d99c1ffffffffffffff43bc59198183fe204ee2d7080000000600000000000000801d5291d76b8c67452107132daffa33021eb82169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c33b047f720f4e89978112322628c7c1fbab650cdcafa532d3524ea85b198cb49066bf549933875e91431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a861b9390ddbad539ef278168ac8d157a656737a7ac0226d366ccec93f9f070000000000008e9234feee7baa2acd2683d489", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1182.255947][ T5563] Memory cgroup out of memory: Killed process 5563 (syz-executor.5) total-vm:72448kB, anon-rss:68kB, file-rss:34828kB, shmem-rss:0kB [ 1182.303765][ T1044] oom_reaper: reaped process 5563 (syz-executor.5), now anon-rss:0kB, file-rss:33932kB, shmem-rss:0kB 10:49:14 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x10000, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1182.409556][ T5592] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1182.494923][ T5580] device nr0 entered promiscuous mode 10:49:15 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:49:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:49:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1182.875423][ T5604] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:49:15 executing program 5: perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0xffffffffffffff01, 0x80000001, 0x4, 0x0, 0x10001, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r6 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r4, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r3, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r7 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r7, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r3, 0x0, 0x0) write$cgroup_int(r6, &(0x7f00000003c0)=0x100, 0x12) 10:49:15 executing program 1: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x10000, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:49:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:49:16 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)='cpu&5\n\n\n\x00\x00\x01\x00\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05') r1 = socket$kcm(0xa, 0x40122000000003, 0x11) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x1f, &(0x7f0000000a00)=ANY=[@ANYBLOB="a23d00009f0ad73a2ac1b3e3a6c46520c95781e1cb3bad9f9ebb9e66e8b3b0bb435b779fb14391fecc6ebbacef64d29b8e846f22a4bf458c5b857ae9b33900370b8c004f661d57897ff929ea58e06d9e7db64cf4e00e9cf1929f4c8d74cbb6ee041242ff9da6d15590ae5608ff0de4d3a2e51f477c56fc25ecc69fd3769eecaf0557db98dd28e300000000000000000000000000090000000000000000000000000045a4f33a8cfeaa0dcb96b5b771531cf1229f0fd18f8de2730ce7a389ddd0ff6e09e7917dacc844c823f693f3ab2da11f95eeaca39eb486400f136f43692ccbe39efa21ca1c297c00009aac816ed1d2d8d629423bf3d3fd872b3cdb"], 0x0, 0xf4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000006c0), 0x80000000) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', r2}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000f00)=@can, 0x80, &(0x7f0000000f80), 0x0, &(0x7f0000000fc0)=""/230, 0xe6}, 0x40000102) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x800) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000000)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000200)='\xef,mime_type\x00') close(r3) r4 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000280)={'ip6tnl0\x00', 0x400}) setsockopt$sock_attach_bpf(r4, 0x6, 0x4, &(0x7f0000000140)=r4, 0x1e4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) sendmsg$kcm(r1, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000000000009110000000000003a00000000f68ab928abffb7a8", 0x26}], 0x1}, 0x0) socket$kcm(0x29, 0x9, 0x0) 10:49:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:49:16 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0xffffffffffffffff, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) 10:49:16 executing program 5: perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0xffffffffffffff01, 0x80000001, 0x4, 0x0, 0x10001, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r6 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r4, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r3, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r7 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r7, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r3, 0x0, 0x0) write$cgroup_int(r6, &(0x7f00000003c0)=0x100, 0x12) 10:49:16 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:49:16 executing program 1: r0 = socket$kcm(0xa, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5e303289b8d6a05e, 0x2}, 0xffffff10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x297ef) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) close(0xffffffffffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000050c0)={0x0, 0x0, &(0x7f0000004c00)}, 0x0) mkdir(0x0, 0x180) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x28, &(0x7f00000000c0)}, 0x10) recvmsg$kcm(r0, &(0x7f0000003700)={&(0x7f00000035c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000036c0)=[{&(0x7f0000003640)=""/41, 0x29}, {&(0x7f0000003680)=""/18, 0x12}], 0x2}, 0x40000000) sendmsg$sock(r2, &(0x7f0000004a40)={&(0x7f0000003740)=@ll={0x11, 0x4, r3, 0x1, 0x1, 0x6, @remote}, 0x80, &(0x7f0000004900)=[{&(0x7f00000037c0)="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", 0x1000}, {&(0x7f00000047c0)="e5d3bf47ea5922bde8d8943dc93fe0c915528bf428a895528b81eee33f16ce2e7ad20a3bbe865661d0fa165f3ccaa47c187abde5964cef138462999b11a3592b84b5271dbae4d69b03b0098a3d29faa14c4a36bee5eedfa8332338f0889aade7d4ce3ac243b9f7ed2f0678e7e5949a412e1d9d60463d689349921466240223e2a3ba00cff67ddf71805f284e0e2d821a85dd79bf3611158cf86aaf4d6f0895fbc5a6e925f063ac0f83df43119e89931f3d5551ff4b72c5138257d4d15765b94155aeb7ca1b713c71404005bb44", 0xcd}, {&(0x7f00000048c0)="8947874d7f21ed9ad03c8a0dc909858e883d543c32160b4b14da", 0x1a}], 0x3, &(0x7f0000004940)=[@txtime={{0x18, 0x1, 0x3d, 0x10001}}, @mark={{0x14, 0x1, 0x24, 0xff}}, @timestamping={{0x14, 0x1, 0x25, 0x100000000}}, @timestamping={{0x14, 0x1, 0x25, 0xffffffffffff7476}}, @txtime={{0x18, 0x1, 0x3d, 0x17}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x40}}, @timestamping={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x30d}}], 0xd8}, 0x20000000) close(r1) r4 = getpid() r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x4009}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r7) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x8, 0x5, 0x5, 0xc9, 0x0, 0x8, 0x0, 0x0, 0x2, 0x6, 0x1, 0x8, 0xffffffffffffffff, 0x400, 0x1000, 0x8001, 0x7, 0x1, 0x6, 0x7fffffff, 0x3, 0x8, 0x400, 0x7, 0x3f, 0x800, 0x3, 0x3, 0x2, 0x2ce6, 0x9, 0x1, 0x3, 0x101, 0x29d0, 0x1c000000000, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f0000000240), 0x1}, 0x80, 0x6, 0x400, 0x3, 0x200, 0x100000001, 0x2ccc}, r4, 0x4, r5, 0xb) r8 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8916, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x11x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') close(r6) r9 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000200)={r9}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r4, r7, 0x0, 0xffffffffffffffeb, &(0x7f0000000300)='\x0fvboxnet1+\xe1^eth0(\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r11, 0x4) sendmsg$kcm(r10, 0x0, 0x1) close(r8) socket$kcm(0x2, 0x0, 0x2) [ 1183.678986][ T5629] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:49:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:49:16 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:49:16 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x9b7) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000180)) r1 = gettid() r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x1ff, 0x8a9, 0x200, 0xffffffff, 0x0, 0x5, 0x0, 0x9, 0xfa9d, 0x100, 0x616, 0xfffffffffffffe01, 0x3bca, 0x5, 0x100, 0x0, 0x8000000100000, 0x1ff, 0x9, 0xffffffffffffffff, 0x4, 0x290e, 0x2, 0x1, 0x3f, 0xfffffffffffffffd, 0x0, 0xffffffffffff0001, 0x9, 0x10001, 0x9f, 0x7, 0x4, 0xf8e, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x100, 0xb5a, 0x10001, 0x9, 0x1, 0x3ff}, r0, 0x0, r0, 0x4) r3 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x7, 0x70, 0x11f800, 0xffffffff, 0x0, 0x81, 0x0, 0x6, 0x40000, 0x6, 0x0, 0x57d, 0x5, 0x3f, 0x8000000000000000, 0x3c, 0xff, 0x2, 0x8, 0x21, 0x7, 0xfffffffffffffffd, 0xff, 0x7ff, 0x6, 0x20, 0xffff, 0x7, 0x1, 0x8, 0x200, 0x200, 0x0, 0x24, 0xa836, 0x3, 0x3, 0x0, 0x0, 0xfc6, 0x5, @perf_config_ext={0x2, 0xfff}, 0x40, 0x101, 0x1000, 0x0, 0x0, 0x2, 0x2}, r1, 0x10, r2, 0xa) sendmsg$kcm(r3, &(0x7f00000001c0)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, 0x0}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], 0xfffffffffffffc2d) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'bcsh0\x00', 0x10}) socket$kcm(0x29, 0x5, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xb, r2, 0x1) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 1184.076832][ T5652] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:49:16 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1184.312561][ T5642] device nr0 entered promiscuous mode 10:49:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1184.522236][ T5671] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:49:17 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1184.689021][ T5679] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:49:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:49:17 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1184.863052][ T5686] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1184.996053][ T5694] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:49:17 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x2}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) [ 1185.475094][ T5709] device nr0 entered promiscuous mode [ 1185.592400][ T5712] IPVS: ftp: loaded support on port[0] = 21 [ 1185.639208][ T8983] device bridge_slave_1 left promiscuous mode [ 1185.646916][ T8983] bridge0: port 2(bridge_slave_1) entered disabled state [ 1185.694346][ T8983] device bridge_slave_0 left promiscuous mode [ 1185.700597][ T8983] bridge0: port 1(bridge_slave_0) entered disabled state [ 1187.417434][ T8983] device hsr_slave_1 left promiscuous mode [ 1187.479562][ T8983] device hsr_slave_0 left promiscuous mode [ 1187.559050][ T8983] team0 (unregistering): Port device team_slave_1 removed [ 1187.571332][ T8983] team0 (unregistering): Port device team_slave_0 removed [ 1187.583297][ T8983] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1187.640681][ T8983] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1187.734127][ T8983] bond0 (unregistering): Released all slaves [ 1187.871692][ T5712] chnl_net:caif_netlink_parms(): no params data found [ 1187.921045][ T5712] bridge0: port 1(bridge_slave_0) entered blocking state [ 1187.928399][ T5712] bridge0: port 1(bridge_slave_0) entered disabled state [ 1187.936674][ T5712] device bridge_slave_0 entered promiscuous mode [ 1187.945614][ T5712] bridge0: port 2(bridge_slave_1) entered blocking state [ 1187.952719][ T5712] bridge0: port 2(bridge_slave_1) entered disabled state [ 1187.960977][ T5712] device bridge_slave_1 entered promiscuous mode [ 1187.968690][ T5709] device nr0 entered promiscuous mode [ 1187.993264][ T5712] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1188.003914][ T5712] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1188.089581][ T5712] team0: Port device team_slave_0 added [ 1188.099274][ T5712] team0: Port device team_slave_1 added [ 1188.236737][ T5712] device hsr_slave_0 entered promiscuous mode [ 1188.273902][ T5712] device hsr_slave_1 entered promiscuous mode [ 1188.365370][ T5712] bridge0: port 2(bridge_slave_1) entered blocking state [ 1188.372605][ T5712] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1188.380130][ T5712] bridge0: port 1(bridge_slave_0) entered blocking state [ 1188.388608][ T5712] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1188.470529][ T5712] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1188.500807][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1188.511456][ T23] bridge0: port 1(bridge_slave_0) entered disabled state [ 1188.526298][ T23] bridge0: port 2(bridge_slave_1) entered disabled state [ 1188.540581][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1188.562697][ T5712] 8021q: adding VLAN 0 to HW filter on device team0 [ 1188.583280][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1188.602282][ T23] bridge0: port 1(bridge_slave_0) entered blocking state [ 1188.609512][ T23] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1188.634810][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1188.645056][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 1188.652197][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1188.661684][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1188.681559][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1188.690531][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1188.699924][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1188.714196][ T5712] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1188.727205][ T5712] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1188.738107][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1188.768741][ T5712] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1188.998467][ T5723] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1189.014836][ T5723] CPU: 1 PID: 5723 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1189.022774][ T5723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1189.032857][ T5723] Call Trace: [ 1189.036158][ T5723] dump_stack+0x172/0x1f0 [ 1189.040682][ T5723] dump_header+0x10f/0xb6c [ 1189.045136][ T5723] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1189.050958][ T5723] ? ___ratelimit+0x60/0x595 [ 1189.055550][ T5723] ? do_raw_spin_unlock+0x57/0x270 [ 1189.060677][ T5723] oom_kill_process.cold+0x10/0x15 [ 1189.072852][ T5723] out_of_memory+0x79a/0x1280 [ 1189.077551][ T5723] ? __sched_text_start+0x8/0x8 [ 1189.082526][ T5723] ? oom_killer_disable+0x280/0x280 [ 1189.087749][ T5723] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1189.093318][ T5723] ? memcg_event_wake+0x230/0x230 [ 1189.098371][ T5723] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1189.104187][ T5723] ? cgroup_file_notify+0x140/0x1b0 [ 1189.109404][ T5723] memory_max_write+0x22f/0x390 [ 1189.114503][ T5723] ? retint_kernel+0x2b/0x2b [ 1189.119111][ T5723] ? mem_cgroup_write+0x360/0x360 [ 1189.124164][ T5723] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1189.130274][ T5723] cgroup_file_write+0x241/0x790 [ 1189.135360][ T5723] ? mem_cgroup_write+0x360/0x360 [ 1189.140400][ T5723] ? kill_css+0x380/0x380 [ 1189.145046][ T5723] ? kill_css+0x380/0x380 [ 1189.149486][ T5723] kernfs_fop_write+0x2b8/0x480 [ 1189.154551][ T5723] __vfs_write+0x8a/0x110 [ 1189.158888][ T5723] ? kernfs_fop_open+0xd80/0xd80 [ 1189.163836][ T5723] vfs_write+0x20c/0x580 [ 1189.168084][ T5723] ksys_write+0x14f/0x290 [ 1189.172459][ T5723] ? __ia32_sys_read+0xb0/0xb0 [ 1189.177254][ T5723] ? do_syscall_64+0x26/0x680 [ 1189.181966][ T5723] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1189.188038][ T5723] ? do_syscall_64+0x26/0x680 [ 1189.192726][ T5723] __x64_sys_write+0x73/0xb0 [ 1189.197365][ T5723] do_syscall_64+0xfd/0x680 [ 1189.201884][ T5723] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1189.207781][ T5723] RIP: 0033:0x4592c9 [ 1189.211678][ T5723] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1189.231294][ T5723] RSP: 002b:00007f238873ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1189.239716][ T5723] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 1189.247688][ T5723] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 1189.255672][ T5723] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1189.263661][ T5723] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f238873b6d4 [ 1189.271634][ T5723] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 1189.305379][ T5723] memory: usage 5284kB, limit 0kB, failcnt 458530 [ 1189.312185][ T5723] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1189.322380][ T5723] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1189.337768][ T5723] Memory cgroup stats for /syz5: cache:60KB rss:4164KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4164KB inactive_file:116KB active_file:112KB unevictable:0KB [ 1189.366904][ T5723] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=5722,uid=0 [ 1189.388966][ T5723] Memory cgroup out of memory: Killed process 5722 (syz-executor.5) total-vm:72580kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB [ 1189.413890][ T1044] oom_reaper: reaped process 5722 (syz-executor.5), now anon-rss:0kB, file-rss:34788kB, shmem-rss:0kB 10:49:21 executing program 2: r0 = openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000040)='io.max\x00', 0x2, 0x0) close(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.stat\x00', 0x0, 0x0) r2 = gettid() write$cgroup_pid(r1, &(0x7f00000000c0)=r2, 0x12) socketpair(0x26, 0x5, 0x800000, &(0x7f0000000000)={0xffffffffffffffff}) close(r3) 10:49:21 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x3}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) 10:49:21 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:49:21 executing program 5: perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0xffffffffffffff01, 0x80000001, 0x4, 0x0, 0x10001, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) sendmsg(r5, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r6 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r4, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r3, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r7 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r7, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r3, 0x0, 0x0) write$cgroup_int(r6, &(0x7f00000003c0)=0x100, 0x12) 10:49:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:49:21 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'nr0\x01\x01\x00', 0x2}) socket$kcm(0x29, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f00000001c0)='/dev/net/tun\x00', 0xffffffffffffffff}, 0x30) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)=r1, 0xc27b020) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000080)=r2) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000100)=0x6) [ 1189.540042][ T5712] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1189.566046][ T5730] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1189.571194][ T5712] CPU: 1 PID: 5712 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1189.579192][ T5729] device nr0 entered promiscuous mode 10:49:22 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1189.583578][ T5712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1189.583585][ T5712] Call Trace: [ 1189.583611][ T5712] dump_stack+0x172/0x1f0 [ 1189.583632][ T5712] dump_header+0x10f/0xb6c [ 1189.583648][ T5712] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1189.583663][ T5712] ? ___ratelimit+0x60/0x595 [ 1189.583688][ T5712] ? do_raw_spin_unlock+0x57/0x270 [ 1189.626817][ T5712] oom_kill_process.cold+0x10/0x15 [ 1189.631989][ T5712] out_of_memory+0x79a/0x1280 [ 1189.636794][ T5712] ? lock_downgrade+0x880/0x880 [ 1189.641668][ T5712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1189.641693][ T5712] ? oom_killer_disable+0x280/0x280 [ 1189.653161][ T5712] ? find_held_lock+0x35/0x130 [ 1189.653193][ T5712] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1189.653209][ T5712] ? memcg_event_wake+0x230/0x230 [ 1189.653233][ T5712] ? do_raw_spin_unlock+0x57/0x270 [ 1189.673674][ T5712] ? _raw_spin_unlock+0x2d/0x50 [ 1189.678555][ T5712] try_charge+0x1042/0x1410 [ 1189.683098][ T5712] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 10:49:22 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1189.688680][ T5712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1189.694959][ T5712] ? kasan_check_read+0x11/0x20 [ 1189.699850][ T5712] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1189.705435][ T5712] mem_cgroup_try_charge+0x24d/0x5e0 [ 1189.710757][ T5712] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1189.716433][ T5712] wp_page_copy+0x416/0x1770 [ 1189.721052][ T5712] ? do_wp_page+0x486/0x1500 [ 1189.725676][ T5712] ? pmd_pfn+0x1d0/0x1d0 [ 1189.729958][ T5712] ? lock_downgrade+0x880/0x880 [ 1189.734833][ T5712] ? swp_swapcount+0x540/0x540 [ 1189.739610][ T5712] ? do_raw_spin_unlock+0x57/0x270 [ 1189.744743][ T5712] ? kasan_check_read+0x11/0x20 [ 1189.744759][ T5712] ? do_raw_spin_unlock+0x57/0x270 [ 1189.744778][ T5712] do_wp_page+0x48e/0x1500 [ 1189.744798][ T5712] ? finish_mkwrite_fault+0x540/0x540 [ 1189.744823][ T5712] __handle_mm_fault+0x22e3/0x3eb0 [ 1189.769702][ T5712] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1189.775367][ T5712] ? find_held_lock+0x35/0x130 [ 1189.780160][ T5712] ? handle_mm_fault+0x292/0xa90 [ 1189.785138][ T5712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1189.791411][ T5712] ? kasan_check_read+0x11/0x20 [ 1189.796303][ T5712] handle_mm_fault+0x3b7/0xa90 [ 1189.801273][ T5712] __do_page_fault+0x5ef/0xda0 [ 1189.806104][ T5712] do_page_fault+0x71/0x57d [ 1189.810635][ T5712] ? page_fault+0x8/0x30 [ 1189.814904][ T5712] page_fault+0x1e/0x30 [ 1189.819078][ T5712] RIP: 0033:0x4303a6 [ 1189.823001][ T5712] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 46 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 bc 4b 64 00 85 c0 0f 84 [ 1189.842794][ T5712] RSP: 002b:00007ffe399771b0 EFLAGS: 00010206 [ 1189.842808][ T5712] RAX: 0000000000019691 RBX: 0000000000714640 RCX: 0000000000008041 [ 1189.842816][ T5712] RDX: 000055555670a930 RSI: 0000555556712970 RDI: 0000000000000003 [ 1189.842823][ T5712] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555556709940 [ 1189.842829][ T5712] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000714698 [ 1189.842836][ T5712] R13: 0000000000714698 R14: 0000000000000000 R15: 0000000000002710 10:49:22 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1189.892332][ T5712] memory: usage 892kB, limit 0kB, failcnt 458542 [ 1189.912220][ T5712] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 10:49:22 executing program 2: r0 = socket$kcm(0x11, 0x4000000002, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={r0, r1}) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) 10:49:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1189.936184][ T5712] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1189.955545][ T5712] Memory cgroup stats for /syz5: cache:60KB rss:4KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4KB inactive_file:116KB active_file:112KB unevictable:0KB 10:49:22 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1190.116978][ T5753] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1190.117642][ T5712] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=5712,uid=0 [ 1190.172460][ T5755] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1190.191416][ T5712] Memory cgroup out of memory: Killed process 5712 (syz-executor.5) total-vm:72448kB, anon-rss:68kB, file-rss:34828kB, shmem-rss:0kB [ 1190.223152][ T1044] oom_reaper: reaped process 5712 (syz-executor.5), now anon-rss:0kB, file-rss:33932kB, shmem-rss:0kB 10:49:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0xffffffffffffff01, 0x80000001, 0x4, 0x0, 0x10001, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 10:49:23 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000001c0)={0x6, &(0x7f0000000100)=[{0x5, 0x100000000, 0x3, 0x3b}, {0x46b7, 0x0, 0xecc, 0x81}, {0x3ff, 0xfffffffffffffffc, 0x7, 0x8}, {0xff, 0x0, 0x7fff, 0x7fffffff}, {0x80000001, 0x10001, 0x4, 0x8001}, {0x1000, 0x2, 0x74a, 0x4}]}) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000026000500d25a80648c63940d1000fc000400024002000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) [ 1190.612819][ T5765] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. 10:49:23 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x4}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) 10:49:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:49:23 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:49:23 executing program 1: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x3c, 0x0, 0x23b) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(r2, &(0x7f000000fc40)={&(0x7f000000eb80)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000fc00)=[{&(0x7f000000ec00)=""/4096, 0x1000}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000000fc80)={0x15, 0x9, 0xffffffff00000000, 0x20, 0x80, r1, 0x9, [], r4, r1, 0x3, 0x5}, 0x3c) perf_event_open$cgroup(&(0x7f0000000200)={0x5, 0x70, 0x4, 0x7fffffff, 0x6, 0x401, 0x0, 0x2, 0x7dc, 0x8, 0x8, 0xffff, 0x6, 0x8, 0x5, 0x80000001, 0x7fff, 0x7f, 0x55f35000, 0x1, 0x10000, 0x4, 0x44, 0x7, 0xfff, 0x7, 0x5, 0x0, 0x4, 0x800, 0x7fff, 0x5b85, 0xff80000000000000, 0x6838, 0xff, 0x1f, 0x9, 0xd3bb, 0x0, 0x79, 0x5, @perf_config_ext={0x29d, 0x7}, 0x2, 0x80, 0x9, 0x8, 0x8, 0x800, 0xfffffffffffffff8}, r1, 0xc, r1, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) openat$cgroup_type(r1, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.events\x00', 0x0, 0x0) close(r1) 10:49:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0xffffffffffffff01, 0x80000001, 0x4, 0x0, 0x10001, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 10:49:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000480)={r1}) r2 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x6e, &(0x7f0000000400), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) [ 1190.994392][ T5781] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:49:23 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:49:23 executing program 2: r0 = socket$kcm(0xa, 0x1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x3b, &(0x7f0000000200)=r0, 0x2e8) sendmsg$kcm(r0, &(0x7f0000000c00)={&(0x7f0000000440)=@in6={0xa, 0x0, 0x0, @remote, 0x2}, 0x80, 0x0}, 0x20004040) 10:49:23 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:49:23 executing program 2: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000480)=@nfc_llcp, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/156, 0x9c}, {&(0x7f0000000780)=""/177, 0xb1}], 0x2, &(0x7f0000000840)=""/203, 0xcb, 0x7}, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000006c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @remote}, 0x3, 0x3, 0x1}}, 0x80, 0x0}, 0x4000) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r2 = socket$kcm(0x2, 0x3, 0x84) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000140)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000004180)=[{&(0x7f0000003ec0)="f89c378bf75ce692b17763", 0xb}], 0x1}, 0x8000) sendmsg(r2, &(0x7f00000001c0)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000000)='.\x00', 0x2}], 0x1}, 0x0) r3 = socket$kcm(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890c, &(0x7f0000000a80)={r3}) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='cgroup.controllers\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000380)) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r5, &(0x7f0000000080)=0xd000, 0x297ef) socketpair(0x2, 0x6, 0x10000, &(0x7f00000000c0)) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'ro\x00\x00\x00\xc7\x00\x00\x00\x00\x00\x00\xdd\r\x00'}) openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x4000, 0x0) openat$cgroup_ro(r1, &(0x7f00000003c0)='cgroup.stat\x00', 0x0, 0x0) recvmsg(r1, &(0x7f0000002d40)={&(0x7f0000002a80)=@xdp, 0x80, &(0x7f0000002d00)=[{0x0}, {0x0}, {&(0x7f0000002c40)=""/156, 0x9c}], 0x3, 0x0, 0x0, 0x7fff}, 0x120) socket$kcm(0xa, 0x20000000000003, 0x11) [ 1191.370840][ T5788] device nr0 entered promiscuous mode [ 1191.376764][ T5802] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:49:23 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:49:24 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1191.995212][ T5784] device nr0 entered promiscuous mode 10:49:24 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x5}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) 10:49:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:49:24 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1192.134277][ T5824] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1192.228888][ T5828] device nr0 entered promiscuous mode [ 1192.414154][ T21] device bridge_slave_1 left promiscuous mode [ 1192.420458][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 1192.464699][ T21] device bridge_slave_0 left promiscuous mode [ 1192.470968][ T21] bridge0: port 1(bridge_slave_0) entered disabled state 10:49:25 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x200000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) close(r0) [ 1194.357825][ T21] device hsr_slave_1 left promiscuous mode [ 1194.419634][ T21] device hsr_slave_0 left promiscuous mode [ 1194.479533][ T21] team0 (unregistering): Port device team_slave_1 removed [ 1194.492285][ T21] team0 (unregistering): Port device team_slave_0 removed [ 1194.509627][ T21] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1194.570834][ T21] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1194.662202][ T21] bond0 (unregistering): Released all slaves [ 1194.758370][ T5835] IPVS: ftp: loaded support on port[0] = 21 [ 1194.845295][ T5830] device nr0 entered promiscuous mode [ 1194.856270][ T5835] chnl_net:caif_netlink_parms(): no params data found [ 1194.892185][ T5835] bridge0: port 1(bridge_slave_0) entered blocking state [ 1194.899868][ T5835] bridge0: port 1(bridge_slave_0) entered disabled state [ 1194.908050][ T5835] device bridge_slave_0 entered promiscuous mode [ 1194.918932][ T5835] bridge0: port 2(bridge_slave_1) entered blocking state [ 1194.928310][ T5835] bridge0: port 2(bridge_slave_1) entered disabled state [ 1194.942081][ T5835] device bridge_slave_1 entered promiscuous mode [ 1195.004629][ T5835] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1195.015233][ T5835] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1195.039198][ T5835] team0: Port device team_slave_0 added [ 1195.048332][ T5835] team0: Port device team_slave_1 added [ 1195.116904][ T5835] device hsr_slave_0 entered promiscuous mode [ 1195.163957][ T5835] device hsr_slave_1 entered promiscuous mode [ 1195.246072][ T5835] bridge0: port 2(bridge_slave_1) entered blocking state [ 1195.253199][ T5835] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1195.260827][ T5835] bridge0: port 1(bridge_slave_0) entered blocking state [ 1195.267997][ T5835] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1195.348855][ T5835] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1195.372539][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1195.387744][T26106] bridge0: port 1(bridge_slave_0) entered disabled state [ 1195.399684][T26106] bridge0: port 2(bridge_slave_1) entered disabled state [ 1195.422161][ T5835] 8021q: adding VLAN 0 to HW filter on device team0 [ 1195.441913][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1195.458098][T26106] bridge0: port 1(bridge_slave_0) entered blocking state [ 1195.465370][T26106] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1195.491543][T15778] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1195.508296][T15778] bridge0: port 2(bridge_slave_1) entered blocking state [ 1195.515491][T15778] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1195.540701][ T8978] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1195.570031][ T8978] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1195.581530][ T8978] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1195.597358][ T8978] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1195.619047][ T5835] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1195.638678][ T5835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1195.652081][T15778] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1195.696507][ T5835] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1195.912096][ T5851] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1195.925593][ T5851] CPU: 0 PID: 5851 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1195.933626][ T5851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1195.943720][ T5851] Call Trace: [ 1195.947269][ T5851] dump_stack+0x172/0x1f0 [ 1195.951708][ T5851] dump_header+0x10f/0xb6c [ 1195.956154][ T5851] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1195.961992][ T5851] ? ___ratelimit+0x60/0x595 [ 1195.966594][ T5851] ? do_raw_spin_unlock+0x57/0x270 [ 1195.971736][ T5851] oom_kill_process.cold+0x10/0x15 [ 1195.977490][ T5851] out_of_memory+0x79a/0x1280 [ 1195.982325][ T5851] ? __sched_text_start+0x8/0x8 [ 1195.987197][ T5851] ? oom_killer_disable+0x280/0x280 [ 1195.992414][ T5851] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1195.998076][ T5851] ? memcg_event_wake+0x230/0x230 [ 1196.003140][ T5851] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1196.008970][ T5851] ? cgroup_file_notify+0x140/0x1b0 [ 1196.014212][ T5851] memory_max_write+0x22f/0x390 [ 1196.019380][ T5851] ? mem_cgroup_write+0x360/0x360 [ 1196.025177][ T5851] ? cgroup_file_write+0x86/0x790 [ 1196.030230][ T5851] cgroup_file_write+0x241/0x790 [ 1196.035203][ T5851] ? mem_cgroup_write+0x360/0x360 [ 1196.040368][ T5851] ? kill_css+0x380/0x380 [ 1196.046388][ T5851] ? kill_css+0x380/0x380 [ 1196.052139][ T5851] kernfs_fop_write+0x2b8/0x480 [ 1196.057115][ T5851] __vfs_write+0x8a/0x110 [ 1196.061507][ T5851] ? kernfs_fop_open+0xd80/0xd80 [ 1196.066479][ T5851] vfs_write+0x20c/0x580 [ 1196.070839][ T5851] ksys_write+0x14f/0x290 [ 1196.075219][ T5851] ? __ia32_sys_read+0xb0/0xb0 [ 1196.080021][ T5851] ? do_syscall_64+0x26/0x680 [ 1196.084707][ T5851] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1196.091278][ T5851] ? do_syscall_64+0x26/0x680 [ 1196.096555][ T5851] __x64_sys_write+0x73/0xb0 [ 1196.101308][ T5851] do_syscall_64+0xfd/0x680 [ 1196.105916][ T5851] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1196.111847][ T5851] RIP: 0033:0x4592c9 [ 1196.115763][ T5851] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1196.135395][ T5851] RSP: 002b:00007f4ab26f8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1196.144067][ T5851] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 1196.152594][ T5851] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 1196.160674][ T5851] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1196.168667][ T5851] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ab26f96d4 [ 1196.176743][ T5851] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 1196.197736][ T5851] memory: usage 5296kB, limit 0kB, failcnt 458543 [ 1196.205735][ T5851] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1196.223564][ T5851] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1196.231203][ T5851] Memory cgroup stats for /syz5: cache:60KB rss:4212KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4212KB inactive_file:116KB active_file:112KB unevictable:0KB [ 1196.255919][ T5851] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=5850,uid=0 [ 1196.273621][ T5851] Memory cgroup out of memory: Killed process 5850 (syz-executor.5) total-vm:72580kB, anon-rss:4228kB, file-rss:35748kB, shmem-rss:0kB [ 1196.294267][ T1044] oom_reaper: reaped process 5850 (syz-executor.5), now anon-rss:0kB, file-rss:34788kB, shmem-rss:0kB 10:49:28 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0xffffffffffffff01, 0x80000001, 0x4, 0x0, 0x10001, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 10:49:28 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x6}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) 10:49:28 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:49:28 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001840)={0xffffffffffffffff, 0x10, &(0x7f0000001800)={&(0x7f00000006c0)=""/12, 0xc, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001880)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev}, 0x1, &(0x7f00000005c0), 0xbd, &(0x7f0000000000)}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001940)={r2, 0x10, &(0x7f0000001900)={&(0x7f00000018c0), 0x0, r1}}, 0x10) 10:49:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:49:28 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x14, &(0x7f0000000080), 0xc6) close(r1) r2 = openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) r3 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x0, 0x1b, &(0x7f00000000c0)='hugetlb.2MB.limit_in_bytes\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r3, r0, 0x0, 0x3, &(0x7f0000000040)='%\'\x00', r4}, 0x30) [ 1196.436521][ T5835] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1196.494220][ T5854] device nr0 entered promiscuous mode [ 1196.495307][ T5858] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1196.514617][ T5835] CPU: 1 PID: 5835 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1196.522553][ T5835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1196.532632][ T5835] Call Trace: [ 1196.535953][ T5835] dump_stack+0x172/0x1f0 10:49:29 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0xffffffffffffff01, 0x80000001, 0x4, 0x0, 0x10001, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) [ 1196.540322][ T5835] dump_header+0x10f/0xb6c [ 1196.544958][ T5835] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1196.551243][ T5835] ? ___ratelimit+0x60/0x595 [ 1196.555863][ T5835] ? do_raw_spin_unlock+0x57/0x270 [ 1196.562334][ T5835] oom_kill_process.cold+0x10/0x15 [ 1196.567768][ T5835] out_of_memory+0x79a/0x1280 [ 1196.572494][ T5835] ? lock_downgrade+0x880/0x880 [ 1196.574992][ T5862] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1196.577368][ T5835] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 10:49:29 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="fb0000002e000104bfa9d345e7eb8d99c1ffffffffffffff43bc59198183fe204ee2d7080000000600000000000000801d5291d76b8c67452107132daffa33021eb82169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c33b047f720f4e89978112322628c7c1fbab650cdcafa532d3524ea85b198cb49066bf549933875e91431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a861b9390ddbad539ef278168ac8d157a656737a7ac0226d366ccec93f9f070000000000008e9234feee7baa2acd2683d489", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1196.577391][ T5835] ? oom_killer_disable+0x280/0x280 [ 1196.577404][ T5835] ? find_held_lock+0x35/0x130 [ 1196.577438][ T5835] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1196.610711][ T5835] ? memcg_event_wake+0x230/0x230 [ 1196.616167][ T5835] ? do_raw_spin_unlock+0x57/0x270 [ 1196.621540][ T5835] ? _raw_spin_unlock+0x2d/0x50 [ 1196.626418][ T5835] try_charge+0x1042/0x1410 [ 1196.631070][ T5835] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1196.636653][ T5835] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1196.642922][ T5835] ? kasan_check_read+0x11/0x20 [ 1196.647785][ T5835] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1196.653347][ T5835] mem_cgroup_try_charge+0x24d/0x5e0 [ 1196.659603][ T5835] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1196.665242][ T5835] wp_page_copy+0x416/0x1770 [ 1196.670120][ T5835] ? do_wp_page+0x486/0x1500 [ 1196.674734][ T5835] ? pmd_pfn+0x1d0/0x1d0 [ 1196.678991][ T5835] ? lock_downgrade+0x880/0x880 [ 1196.684625][ T5835] ? swp_swapcount+0x540/0x540 [ 1196.689392][ T5835] ? do_raw_spin_unlock+0x57/0x270 [ 1196.694525][ T5835] ? kasan_check_read+0x11/0x20 [ 1196.699398][ T5835] ? do_raw_spin_unlock+0x57/0x270 [ 1196.704546][ T5835] do_wp_page+0x48e/0x1500 [ 1196.709082][ T5835] ? finish_mkwrite_fault+0x540/0x540 [ 1196.714473][ T5835] __handle_mm_fault+0x22e3/0x3eb0 [ 1196.719880][ T5835] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1196.725821][ T5835] ? find_held_lock+0x35/0x130 [ 1196.730960][ T5835] ? handle_mm_fault+0x292/0xa90 [ 1196.736191][ T5835] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1196.742491][ T5835] ? kasan_check_read+0x11/0x20 [ 1196.747348][ T5835] handle_mm_fault+0x3b7/0xa90 [ 1196.752129][ T5835] __do_page_fault+0x5ef/0xda0 [ 1196.756924][ T5835] do_page_fault+0x71/0x57d [ 1196.761469][ T5835] ? page_fault+0x8/0x30 [ 1196.765723][ T5835] page_fault+0x1e/0x30 [ 1196.769876][ T5835] RIP: 0033:0x4303a6 [ 1196.773784][ T5835] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 46 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 bc 4b 64 00 85 c0 0f 84 [ 1196.793684][ T5835] RSP: 002b:00007ffcbbaab750 EFLAGS: 00010206 [ 1196.799749][ T5835] RAX: 0000000000019691 RBX: 0000000000714640 RCX: 0000000000008041 [ 1196.807735][ T5835] RDX: 00005555559ef930 RSI: 00005555559f7970 RDI: 0000000000000003 [ 1196.815713][ T5835] RBP: 0000000000008041 R08: 0000000000000001 R09: 00005555559ee940 [ 1196.823683][ T5835] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000714698 [ 1196.831651][ T5835] R13: 0000000000714698 R14: 0000000000000000 R15: 0000000000002710 [ 1196.842077][ T5835] memory: usage 908kB, limit 0kB, failcnt 458555 [ 1196.848523][ T5835] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1196.856256][ T5835] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1196.863127][ T5835] Memory cgroup stats for /syz5: cache:60KB rss:52KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:52KB inactive_file:116KB active_file:112KB unevictable:0KB [ 1196.886248][ T5835] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=5835,uid=0 [ 1196.902927][ T5835] Memory cgroup out of memory: Killed process 5835 (syz-executor.5) total-vm:72448kB, anon-rss:68kB, file-rss:34828kB, shmem-rss:0kB [ 1196.917636][ T1044] oom_reaper: reaped process 5835 (syz-executor.5), now anon-rss:0kB, file-rss:33932kB, shmem-rss:0kB [ 1196.942766][ T5868] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:49:29 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1197.012767][ T5869] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:49:29 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1197.231544][ T5867] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1197.263792][ T5867] CPU: 1 PID: 5867 Comm: syz-executor.2 Not tainted 5.2.0-rc3+ #16 [ 1197.267890][ T5876] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1197.271846][ T5867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1197.271854][ T5867] Call Trace: [ 1197.271884][ T5867] dump_stack+0x172/0x1f0 [ 1197.271910][ T5867] dump_header+0x10f/0xb6c [ 1197.271933][ T5867] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1197.271953][ T5867] ? ___ratelimit+0x60/0x595 [ 1197.271973][ T5867] ? do_raw_spin_unlock+0x57/0x270 [ 1197.271996][ T5867] oom_kill_process.cold+0x10/0x15 [ 1197.272028][ T5867] out_of_memory+0x79a/0x1280 [ 1197.329202][ T5867] ? __sched_text_start+0x8/0x8 [ 1197.334094][ T5867] ? oom_killer_disable+0x280/0x280 [ 1197.339349][ T5867] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1197.344930][ T5867] ? memcg_event_wake+0x230/0x230 [ 1197.350011][ T5867] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1197.355947][ T5867] ? cgroup_file_notify+0x140/0x1b0 [ 1197.361206][ T5867] memory_max_write+0x22f/0x390 [ 1197.366205][ T5867] ? mem_cgroup_write+0x360/0x360 [ 1197.371274][ T5867] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1197.376862][ T5867] cgroup_file_write+0x241/0x790 [ 1197.381925][ T5867] ? mem_cgroup_write+0x360/0x360 [ 1197.386992][ T5867] ? kill_css+0x380/0x380 [ 1197.391372][ T5867] ? kill_css+0x380/0x380 [ 1197.395737][ T5867] kernfs_fop_write+0x2b8/0x480 [ 1197.400629][ T5867] __vfs_write+0x8a/0x110 [ 1197.405008][ T5867] ? kernfs_fop_open+0xd80/0xd80 [ 1197.409987][ T5867] vfs_write+0x20c/0x580 [ 1197.414359][ T5867] ksys_write+0x14f/0x290 [ 1197.418824][ T5867] ? __ia32_sys_read+0xb0/0xb0 [ 1197.423627][ T5867] ? do_syscall_64+0x26/0x680 [ 1197.428335][ T5867] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1197.434439][ T5867] ? do_syscall_64+0x26/0x680 [ 1197.439156][ T5867] __x64_sys_write+0x73/0xb0 [ 1197.443778][ T5867] do_syscall_64+0xfd/0x680 [ 1197.448317][ T5867] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1197.454243][ T5867] RIP: 0033:0x4592c9 [ 1197.458165][ T5867] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1197.477915][ T5867] RSP: 002b:00007f007f25ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1197.486356][ T5867] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 1197.494945][ T5867] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 1197.502940][ T5867] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1197.510935][ T5867] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f007f25f6d4 [ 1197.519032][ T5867] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff 10:49:30 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1197.530606][ T5867] memory: usage 14452kB, limit 0kB, failcnt 258890 [ 1197.537734][ T5867] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1197.550574][ T5867] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1197.557957][ T5867] Memory cgroup stats for /syz2: cache:6092KB rss:4316KB rss_huge:4096KB shmem:5960KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:5940KB active_anon:4244KB inactive_file:0KB active_file:8KB unevictable:0KB [ 1197.581970][ T5867] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=5865,uid=0 [ 1197.598724][ T5867] Memory cgroup out of memory: Killed process 5865 (syz-executor.2) total-vm:72576kB, anon-rss:4244kB, file-rss:35784kB, shmem-rss:0kB [ 1197.616613][ T1044] oom_reaper: reaped process 5865 (syz-executor.2), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB 10:49:30 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) [ 1197.741012][ T5883] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:49:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1197.806553][ T5863] device nr0 entered promiscuous mode 10:49:30 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:49:30 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x5}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) [ 1197.976977][ T5889] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:49:30 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 10:49:31 executing program 1: r0 = socket$kcm(0x11, 0x2, 0x0) sendmsg$sock(r0, &(0x7f00000026c0)={&(0x7f0000000000)=@ax25={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x80, &(0x7f0000002600)=[{&(0x7f0000000080)="c603c9945e47", 0x6}, {&(0x7f0000000240)="edda0fc43e1c8c1e22f8219fa2970c8c5f29c41b6552550de7d74661210f0b2194a2d2c26ef8a46faea122527b36033bfcec67f4cccdcbcfe71059c9be76c2a695d64d747f4ddac81a0118ec6806e3a73f82308427815ae83747bbee60321fa9f484318f5ef5f22a6db77b41e28c2b264ed7e803ccd12e0b3e3c63475b00004b343cb5895243ef5be01d963dfad88ca0abc91e5a08edb29f27cded350d35b23ff5aeb678d2f00cff3234cb5d1e80337398a71feea88483d00c4861b2a59e80b20ef8af99f0ce7b2d2bd9f692e5ad6f843638f4f7885d3f6511f58c026b76d1000f91060985b280e0267fec0439", 0xed}, {&(0x7f0000000340)="365032f446d2dd7f3a05300301576e4649bd31591aede78d44257a328cf447f28ea1a12211abcc6ad229e2542a7af2484c8d5e90e6e5e9005d58b88bdd8275ea55bc40b23b10d5ed52ebfda4803b623647dfcf22cd7cf2538a44cc51a5a9e06e8000d6501986be82f041d70e29c0aced39c3e745eadb4cf6f8cbf5da056121e5ee61c70b3c9897b63aed01", 0x8b}, {&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000001400)="0264c94a7b635b708e71a8d9e79ca02411e0d07bc3febbf6af25ca5afe43e328793ad59b78a14740705502b1a67c66d92f91112b4562dcd1c709392a30e9b1fc13d3737eab6b52336ce645e398956f8ebb570e544273dbc92e1ef0c6d392a3f4e1935b3fb9a049cd09e0dda59953607d2a79547c5d02a0dbc90edb45edce3bf3fd7318589850", 0x86}, {&(0x7f00000014c0)="3452ec4c2e6b4e373b5966bdc9e5ededbb903905dbcb6f35a5489ebedc8ab6969bd2b946e701d69d7771c3c87d7538ec2b5eb9804bfc7f776045dec9505191c35c7aa783d61876943dd7dce4351bb91c25a4af83f1c05771837922838888e42b025d5117d96a04b028261eb5cef33b8ece0f4d30c9c73133889700f9621b43263dfce42a06dc4f620be19dfe6c9830f6a01e32cb650cb8fcdbc166919be7924362decd04c438d26a6c544646b17e8930e6183b29e1a8cd54d78fc504ea0df920d83fad582f6776ddba317d9e7fd7cd43dd49dc67a7d1ca9e2c1c3d9c840472d1cc7dd182b6cb17f0cf1eeedcc76535e3279a274a7e81a5d10ba75a5321a3cc267ae8d8ced3687b6c0d6de5d9587ed7f7ce154b20ecca451704304897ae96042d128d04df484e62851811c33e9af6446acfe4e3d2fc0d056ab1704811d774f568d7932790d2757ba9a3596a712c9e20e4560440a7fdca38b3c775ecc0b09b12fc72cc67260340f25bc2d8bc0d3faf95eacfac90857c96b7eac4fe553d1d71f91b59c0c94a5381845809edbf791f1af4ca301522e92a0d9bd0dc841169bb628628fcb8eab7d18886996de2a74d5553dbe6f9635cfc705c9ac158c30f7d7d5937cc0d2195cb211340be4b78d688004d9665e69ad0888fb569daa604ade1f9f0663febb7307908cbe3ab6ea8e03b577ab4979b267c1565df4452c56b968f2407d68be6d940a3b057b036e237edbc30f26bd65fa518c17fd07c4edf8b19502c8bebbe3db2ade18f7b859d265872bc7378c4231dd96197833d30f5e058cb648767002447757e363279377ebe2dce4bb2b33e03441c80f5cbc573eec1fbf2bb20311b543743516f134b01740c2d32b6a59e89cd8dabd143f2727698a360979897f54530bd88f2778653342e5c88c6d3b3565d257a13411547d3f8e49de8b60fcab1de5144d899f801a0a1d8a8b8684684757facccac3cdb7829fa0a128f6530d6397fdd444a7b3667750dc3e87679de70b8e805db5b515e925346c9554b7239a44373d461cbc5d765df1775bc4403197a2ae7075d1e829585c0c8bf6cd53a7b22eabe1675682b404d3849b1a60cb2480dad37bca42102224b7dac88c6a73bd7c92a1343150dfd4728f6ae36805d299828f9cfc907191954b35a1ab2ba63f5f6c0e54991a1ee5b17639b2dff14cf3492cabd4b27bf6ebffcb7d84a43261981f0ef7fd9b9eb1cea545d4732805ca6d44a39f829ea6983643d39596306a455c4e14daacb9b5b928b1a9254f88ea9679f318edb5f1415a05bef848cbde59fa5999e48a9be34b8a1a3148ac27c9b3d0859e3adeb963455857f96c23a54684e957819e29772f27834d3401b6a84bde2cf9ca4df6b244e89d4d0f7cd1e60d1c13eb4974f6ad442c6a5a5a5df16ab50b614c49254990da4e984b5efe400aff4f9cdadbf7c0152e4bf47d6541e0b5a35a114238fcffed1b77ad2659b9ce8f9a275b5892fa1457945de39ec24358c3bf7009d2f3c24608ff9dde6968dfc92d1553b2d3f23898e39ba80379222209605895b9a9f4d71747ce5b81d03c1f6a7edf36baa5e5899a0493200ff126f54680e2c7b14d6b1e25a55395e04dd6a24da96110c75f700d525b6669c1765f3b9bff6895e1611385911cee974bc2a0f57c24ad9e674cc27998effa78993d68d68bc0b7c126ef04b5187ad035039966fdafeb13e972fc37a14c940cd77a6f493e2c4ae6095814c1eb86b64009e4a78c5b39103281d79673499249be1d77c4c574a014dbc5a881167edac8f4e5507baec78d8fa48396d248f4332ea527c837cb69086d958ac62143235fcad1f90fc234e7d19156dc50744f9c94edc1602f509cc11aaabe218ee94fae78a4a55a02f987f777c55914273d6d47f9834f1c5a2bdfb6c14078d9a3f47b94d709697d903cd17e2e855725f9616c2382f8bf24ee35e51f9405993ff1df36c06d15ded5303215eec00f0d5d4b7ec9fdbf59d6a465c4b0661d310166f360e20faa4efbd7fb66b184ed371b1ed540dd21da3a36fd8cfd48daa85c25ea91b0796e5e5b6be1648908e66b2ff3195945ee0cb2a40991f3b8df4b60c7e0de56c79fd723db4a951dce42eec45ca52b65a6399c88407c09329650a19ac20ac90bdabf60ff939b081326bd0e307e7ec61f3265a11ace148eff81c45aff57338519250d27ad96640d8fb193ff1e4ee28ed257cf7c9a7ee2653633c3eb902d6f83c61ab2365ed9c66ebd2edd6ea717c6d20cd86e365bccc10fa46d5789522cd0ca607052a6d8d3c1e757a92a1fb1c09015b47fec3bba05455deaf58eb223d1ef7868226e5c00ae605c4b37ffa39f3e2ce49894c95b17f173b27402757eb28f8f07203f310ff6bef7b50dde9489833284c43ae5997ae345f70f411d88bae535ccd4c8ca27e479a885b8ddc91ca3597792d090773a0362e17b7be28b8e4f675df7b466b45413a20649e9dfda6b2ce4d1e8a82dd6d4f2229a350c1b6cf9dede3ce2969c893bdab966d7b7dbd38bccd638507215ce444850fa0c24458c0d48dee83fa5b523f77e1beaf31818668f64360340b67140d659cbaa7dee7cc8ffb049f4584a93a4434632ea88c70cc28efd0bc2bf472a496454800ce74e2372938d7382ed6f532347390f40a2118b4324e50906b0679ca97485d57e0b9a1f2312227d574b6646f7a33c068bfe55201fdd50538aae3fecb7cef349d21e8fbcd7f91a5e4d5fbbddd84341ffcd4b76bbfc09fd440b93b6349d773a9345cb41e0ed8555da0c1c28b8b68a70844cb3874c228bb7404c5bb63624fdaaed38cd63feb2d8a0b8e2a794afc747a72941c6bbae087a5e5e64ab332320b2136d88baafbe8030885df638dc090fd67f412e623072dce1e715f94bb7e779bb0604e06464b514ae2428fc22e2229f2c92a3bceb60bd4e626878d20198eb9320aa22257ce6d0e7b1e03c26d1a77e1117fa25064f8bacbfb7b40cff2fbdf0cd30db86aef3bb6d5d6429bf169bbb11d9aa53e81b150a64e080c40be248fca1c8c461f713cfa1a34fae244c4c8bc99ca9c1121c498b8b5bb32220716fd62dbe06644dbae8f13488e40b6d8db31e745aaefe1ddd1030cbbe8a36a022152f5c843c1e9f0ec0ccffe403855c2a14d604369744500e653d22fb0afd47266a11c0a8a4f23475c9aa9e7ccad4bf892fc4c3e89480fe595d85189bfe6677eed5c7402979126f98acf43ace23772cdded7bdb725430b8d2653dc88e4319b3bad2ca73b1a28ac9b5482db34dfb87d71cd2ce04820f6e34be8aa9422dc1c7f7abbbdcb3696ca29f841f38cdfc4b8dd9b66086684d4fa6c2b06c0f4cb14c14a6b214cf0f7e43034a846a125af8a69e85f0ff95cc372ca7ea426e56cf8ef92a4a621f88b1896621fb4de43f6a9662395fbc4b880e209946e04cea3be81822b3d4278cf30d1a62f38ccc9a27f8544b736c24c9ba79c2014ca73833bffdf717e107203d0a48bdbef37e2ac45e644e5207ba231f74828fdb752defb0e2484318e89e62da7c72adab1d19ce19ff5c460d3d7a9e61c058b85be0f8c0642ecabe5a1b284a376fa17ba797cac067ed41f09508b4b54e91a5286cbb122ce413a036c810cb387193b068f98ec3fe9db71ea603a8e3bfc70b832a4c130f1678cf69d5d9a2d8137898f4397fba4b6d8bfe97f5067270da53408c7ab103cbd14adad6d67699ec3e61a3a9990f53145b6b1bcddcf1c472acfae0d81f44c25468f69a8527da8da47f4ca77d35e232acdaa6d31be42d1d53468501bb40b608d5b82944fca8f8daa221bdd4739141437905b9d11cdfca12effb0924711e226d28930c15d4b80c0f805b4487bb4702dcd3463bef1d5b6b31902dbbe81c125802db894fdeb344cf2603ac7c1c164b443d7c41bf528597e13d24dafea4091c7ecd395349954b0f682dbeea749f8e6f2c999bd1b1a8a7beb9b798eb68bbba5079b564eb01339bdc27453ac9e4ab15e1370bc9d2f9e407a3bc243ad01e85ca47ad499d293bc0a229a34acf5dd187a4281c7098d8c1074c24ba993c07e83c7198ba7e1398f2948a966b7e6156a19379f59d20ac68d585990a5da377c9ba3d25fdc9b8257999239a00e6a58f45676ea28aaa0e879c96b9e870bfa1aa874d51298ca416e12773e900ddbc14c91f13387b27e3458ce4e0f7413836d28102b82621b3481403e515069258e460d4f4ca1892b4217cf182a5670e8b4681f07ff110bee7eeed1f41ad0b6e0675a593bfa66d7182445350cfc8aa65258e2ed24f348a3cbf92247a567d976ab84bb564b1ddfbbe7c100b89c38b41f98682d45278a4ee618fabc3d1cf81bf9fcf9fc0e7c5e5a1697943e7e039396571edd3e1784a4e672ae15664eb7ab54227109c4a87155c81237554c717a7288816af671de9311e3a4ff00905410cf79bc5a64fe2e3736789b82920853e7b7634852f9f2033afe856bbe6a0af5d908c85bc512b18dbf96d6a961f8c9db6c320a7d9ada9ca654650ea98feada914f06c008fc22397c51320418aa936ef847d161bee07503cff1c5f9fb32c3bbf26d7cfc7cdb7d21300e2b651bf21065c7f6ef0d2d3842d571dcfe5a237e78675d5e82d2a9ee918fb013d276e56a11a8bc7c614b8ef9b23d8fc18b151be278b1a0b8a14c5436df020509023a81b8e030b3a34279a6734cb3bb06dd64f19d0d9389e95d96ff9f586033fa6f05035646c8f1a0dbeaf0b0af13ffea3be01c3c17c2f612007fcba3103e79df45654b26f1ec2a6aacd3ada084dc12575b965ada2329e1a614c63977edd16085dc0ac997c9994e6f2a5af4a8f5de8de4c2f21ea21ee95604fbf1200bc74d9fa184afe37f2e26a7247748439787565e8ea7f27b2436929c6e293c2d17ce8691846ddf512a56f3681d607a8354a5b5f9fad5fa1da45174a887701a0a25985b183a0bfd995404ce8180c5d58c21b5b49dccb1fdc5f78d93bc608929ad3ba29acac753e982cd1e60e027ca2159b5e8ab3824e8e50fafac80bb34bbf1596abbfece80f513c89916d180eec7155fd7a30813308b6455b53a206f04f4ac9e35b9590308a8679033b5ddacb340ce7eb4087767320b7bf4814517bc0b7191ca580a094ff95012f841814dcef39ca6d22386fe636d27e931444939929143237f325cda273037177d1bdadbc51a5a335ea1a532f8ead4c323c45306b6478a2357eea5045bec3ed989b2e09cece99a5210fe4aded14388f65ef9e67ddd53799ab94c5c30c8b357b929d170a80d0ef6aaa72389ac1aa36812de51bbab0338961cd5e752d4ec3073707cb0aca55c60ebb96d04179c9517bf76bb035ffaa78a48219b9fd2437333a25b5fbec16800ef6a06c388d749ef2fd6fc786da8b0b0e6e7d31d7bef65fd6a28018fa21ea4c88d957ad2ce6d8af0937af1458b54093efdea44f0ddf9d4173e96a657661b01175e1121e4e10b2a360263cbe5099a133b2f86eabc0f43b98b39a9f0e6062a01941e56ff8a7d9599cbdb0f6cf571f322056f3ff1dcb2258b0765a8a9a11175fdddd50aea96cbe618e1049528b58baf64c423b059d3b601d82c68f0d719698c44a791317ad30701a4ee97cc5b15a075d7aeed6965f6213dc3be17a9d31d50e610e78a27263a3e286f882449b1944dfa524e21d4302294f4e931f6ad31a9a7eb091a2d938bc5cbc5e0b8af2291129a9a02a958510bc53451b63e19c7a3f6ea2a071e1fd38bb823f631d11a261d7f95505dd6292c981e910f69ce5c0f2726cf6011cd10616a27c331e95fd26446a5e017c62c38a8a09f6a2a86c5fb9113464a59d68a04d27766", 0x1000}, {&(0x7f00000024c0)="a0c93c5c9ee4fad861a188bf5c877bd5f289ebe699046a7b3a0650e09fa5bb7cdd741eb89f9286e5354f0faf6a467b631ac1eed7050b427410cd849fc87fba38bc93cafd5edb32e401d181a9205025e9208a6c265b6a685c1805f12e0edb2e690b38e3e4585f8149501923fbd3de10519d3fa9c59c97ee44ca4a933b897c1fa131e501da17678979a22bada65997184f9fbf3bc7cd6f", 0x96}, {&(0x7f00000000c0)="a85532d2c7c7edd405bad0f6fdaea250a551ea796acf20ccf788ab44f33687ec43aa610a0f1322f9c610269ddd68085a97b98dd81453bee429d450efef3d5e6bcdd4d4bba73e290c366eed79e27a6449642d36527a971d19d342e0f65285742617f215a4b607bf9d85724d17", 0x6c}, {&(0x7f00000001c0)='a', 0x1}, {&(0x7f0000002580)="1738e805ca42249b1a604dfbc7cba84b4734d16a05c885635341b41a6122d96e5c8f0bb8e60675ae5bbd374f72cbc9e17ed7d06bf795b234635a158171fb11757cc153d177523a216479dc4a4313f3658b2b7b5beb8355522ff67da48b9eefae3e5294baa3b428caea82611567", 0x6d}], 0xa}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000140)=@l2={0x1f, 0xffffdd86, {0x6}}, 0x2f4, &(0x7f0000000040), 0x100000000000002c, &(0x7f0000000300)}, 0x0) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002700), 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000002740)={r0, r1}) 10:49:31 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:49:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:49:31 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x8}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) [ 1199.022495][ T5903] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:49:31 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, 0x0, 0x0) 10:49:31 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, 0x0, 0x0) 10:49:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1199.296002][ T5905] device nr0 entered promiscuous mode [ 1199.473799][ T5920] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:49:32 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, 0x0, 0x0) [ 1199.566104][ T5923] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:49:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:49:32 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1199.941209][ T5932] IPVS: ftp: loaded support on port[0] = 21 [ 1200.169753][ T5899] device nr0 entered promiscuous mode [ 1200.521243][ T21] device bridge_slave_1 left promiscuous mode [ 1200.528874][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 1200.584967][ T21] device bridge_slave_0 left promiscuous mode [ 1200.591214][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 1203.956747][ T21] device hsr_slave_1 left promiscuous mode [ 1204.019362][ T21] device hsr_slave_0 left promiscuous mode [ 1204.078976][ T21] team0 (unregistering): Port device team_slave_1 removed [ 1204.098863][ T21] team0 (unregistering): Port device team_slave_0 removed [ 1204.119538][ T21] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1204.191100][ T21] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1204.337196][ T21] bond0 (unregistering): Released all slaves [ 1204.490593][ T5932] chnl_net:caif_netlink_parms(): no params data found [ 1204.540623][ T5932] bridge0: port 1(bridge_slave_0) entered blocking state [ 1204.554987][ T5932] bridge0: port 1(bridge_slave_0) entered disabled state [ 1204.566646][ T5932] device bridge_slave_0 entered promiscuous mode [ 1204.589995][ T5932] bridge0: port 2(bridge_slave_1) entered blocking state [ 1204.601268][ T5932] bridge0: port 2(bridge_slave_1) entered disabled state [ 1204.611675][ T5932] device bridge_slave_1 entered promiscuous mode [ 1204.700265][ T5932] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1204.740450][ T5932] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1204.807151][ T5932] team0: Port device team_slave_0 added [ 1204.819814][ T5932] team0: Port device team_slave_1 added [ 1204.886731][ T5932] device hsr_slave_0 entered promiscuous mode [ 1204.953825][ T5932] device hsr_slave_1 entered promiscuous mode [ 1205.025970][ T5932] bridge0: port 2(bridge_slave_1) entered blocking state [ 1205.040846][ T5932] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1205.057203][ T5932] bridge0: port 1(bridge_slave_0) entered blocking state [ 1205.066702][ T5932] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1205.220754][ T5932] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1205.278124][T15778] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1205.299672][T15778] bridge0: port 1(bridge_slave_0) entered disabled state [ 1205.339566][T15778] bridge0: port 2(bridge_slave_1) entered disabled state [ 1205.380639][T15778] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1205.428110][ T5932] 8021q: adding VLAN 0 to HW filter on device team0 [ 1205.468434][T15778] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1205.489134][T15778] bridge0: port 1(bridge_slave_0) entered blocking state [ 1205.497859][T15778] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1205.527526][T15778] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1205.569921][T15778] bridge0: port 2(bridge_slave_1) entered blocking state [ 1205.588762][T15778] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1205.664057][ T5942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1205.678957][ T5942] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1205.714481][ T5942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1205.754370][ T5942] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1205.784029][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1205.798040][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1205.816824][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1205.833217][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1205.851849][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1205.874001][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1205.910195][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1205.952212][ T5932] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1205.996341][ T5932] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1206.328480][ T5949] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1206.341160][ T5949] CPU: 1 PID: 5949 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1206.359473][ T5949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1206.372233][ T5949] Call Trace: [ 1206.377086][ T5949] dump_stack+0x172/0x1f0 [ 1206.382926][ T5949] dump_header+0x10f/0xb6c [ 1206.389236][ T5949] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1206.395817][ T5949] ? ___ratelimit+0x60/0x595 [ 1206.402100][ T5949] ? do_raw_spin_unlock+0x57/0x270 [ 1206.410120][ T5949] oom_kill_process.cold+0x10/0x15 [ 1206.417778][ T5949] out_of_memory+0x79a/0x1280 [ 1206.427339][ T5949] ? retint_kernel+0x2b/0x2b [ 1206.439066][ T5949] ? oom_killer_disable+0x280/0x280 [ 1206.448489][ T5949] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1206.459229][ T5949] ? memcg_event_wake+0x230/0x230 [ 1206.466184][ T5949] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1206.473360][ T5949] ? cgroup_file_notify+0x140/0x1b0 [ 1206.479626][ T5949] memory_max_write+0x22f/0x390 [ 1206.485115][ T5949] ? mem_cgroup_write+0x360/0x360 [ 1206.490790][ T5949] ? lock_acquire+0x16f/0x3f0 [ 1206.496843][ T5949] ? kernfs_fop_write+0x227/0x480 [ 1206.502832][ T5949] cgroup_file_write+0x241/0x790 [ 1206.509165][ T5949] ? mem_cgroup_write+0x360/0x360 [ 1206.514858][ T5949] ? kill_css+0x380/0x380 [ 1206.519733][ T5949] ? kill_css+0x380/0x380 [ 1206.524788][ T5949] kernfs_fop_write+0x2b8/0x480 [ 1206.530507][ T5949] __vfs_write+0x8a/0x110 [ 1206.535024][ T5949] ? kernfs_fop_open+0xd80/0xd80 [ 1206.541743][ T5949] vfs_write+0x20c/0x580 [ 1206.547577][ T5949] ksys_write+0x14f/0x290 [ 1206.553297][ T5949] ? __ia32_sys_read+0xb0/0xb0 [ 1206.559271][ T5949] ? do_syscall_64+0x26/0x680 [ 1206.566499][ T5949] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1206.573573][ T5949] ? do_syscall_64+0x26/0x680 [ 1206.578875][ T5949] __x64_sys_write+0x73/0xb0 [ 1206.584649][ T5949] do_syscall_64+0xfd/0x680 [ 1206.591539][ T5949] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1206.602953][ T5949] RIP: 0033:0x4592c9 [ 1206.608282][ T5949] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1206.636454][ T5949] RSP: 002b:00007f77ee13cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1206.648185][ T5949] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 1206.658940][ T5949] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 1206.670991][ T5949] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1206.681918][ T5949] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f77ee13d6d4 [ 1206.696115][ T5949] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 1206.712058][ T5949] memory: usage 5388kB, limit 0kB, failcnt 458556 [ 1206.722068][ T5949] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1206.737853][ T5949] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1206.759510][ T5949] Memory cgroup stats for /syz5: cache:60KB rss:4168KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4168KB inactive_file:116KB active_file:112KB unevictable:0KB [ 1206.793895][ T5949] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=5948,uid=0 [ 1206.816625][ T5949] Memory cgroup out of memory: Killed process 5948 (syz-executor.5) total-vm:72712kB, anon-rss:4192kB, file-rss:34816kB, shmem-rss:0kB [ 1206.839167][ T1044] oom_reaper: reaped process 5948 (syz-executor.5), now anon-rss:0kB, file-rss:34784kB, shmem-rss:0kB [ 1207.147106][ T5932] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1207.161840][ T5932] CPU: 1 PID: 5932 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1207.171907][ T5932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1207.183686][ T5932] Call Trace: [ 1207.188690][ T5932] dump_stack+0x172/0x1f0 [ 1207.193556][ T5932] dump_header+0x10f/0xb6c [ 1207.198366][ T5932] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1207.204493][ T5932] ? ___ratelimit+0x60/0x595 [ 1207.209521][ T5932] ? do_raw_spin_unlock+0x57/0x270 [ 1207.216075][ T5932] oom_kill_process.cold+0x10/0x15 [ 1207.221570][ T5932] out_of_memory+0x79a/0x1280 [ 1207.227208][ T5932] ? lock_downgrade+0x880/0x880 [ 1207.232603][ T5932] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1207.240297][ T5932] ? oom_killer_disable+0x280/0x280 [ 1207.245623][ T5932] ? find_held_lock+0x35/0x130 [ 1207.251191][ T5932] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1207.257203][ T5932] ? memcg_event_wake+0x230/0x230 [ 1207.263059][ T5932] ? do_raw_spin_unlock+0x57/0x270 [ 1207.274505][ T5932] ? _raw_spin_unlock+0x2d/0x50 [ 1207.281734][ T5932] try_charge+0x1042/0x1410 [ 1207.288786][ T5932] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1207.296280][ T5932] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1207.304412][ T5932] ? kasan_check_read+0x11/0x20 [ 1207.311971][ T5932] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1207.318874][ T5932] mem_cgroup_try_charge+0x24d/0x5e0 [ 1207.326387][ T5932] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1207.335270][ T5932] wp_page_copy+0x416/0x1770 [ 1207.341171][ T5932] ? do_wp_page+0x486/0x1500 [ 1207.346496][ T5932] ? pmd_pfn+0x1d0/0x1d0 [ 1207.351937][ T5932] ? lock_downgrade+0x880/0x880 [ 1207.358232][ T5932] ? swp_swapcount+0x540/0x540 [ 1207.364608][ T5932] ? kasan_check_read+0x11/0x20 [ 1207.370817][ T5932] ? do_raw_spin_unlock+0x57/0x270 [ 1207.376647][ T5932] do_wp_page+0x48e/0x1500 [ 1207.382386][ T5932] ? finish_mkwrite_fault+0x540/0x540 [ 1207.389100][ T5932] __handle_mm_fault+0x22e3/0x3eb0 [ 1207.395083][ T5932] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1207.402201][ T5932] ? find_held_lock+0x35/0x130 [ 1207.409100][ T5932] ? handle_mm_fault+0x292/0xa90 [ 1207.416531][ T5932] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1207.432289][ T5932] ? kasan_check_read+0x11/0x20 [ 1207.441863][ T5932] handle_mm_fault+0x3b7/0xa90 [ 1207.447598][ T5932] __do_page_fault+0x5ef/0xda0 [ 1207.453833][ T5932] do_page_fault+0x71/0x57d [ 1207.459537][ T5932] ? page_fault+0x8/0x30 [ 1207.464637][ T5932] page_fault+0x1e/0x30 [ 1207.469937][ T5932] RIP: 0033:0x403672 [ 1207.474993][ T5932] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 79 86 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 99 3b 05 00 48 [ 1207.503341][ T5932] RSP: 002b:00007ffc17153b30 EFLAGS: 00010246 [ 1207.512235][ T5932] RAX: 0000000000000000 RBX: 00000000001267f9 RCX: 0000000000412ed0 [ 1207.524863][ T5932] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffc17154c60 [ 1207.537043][ T5932] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000555555c22940 [ 1207.547343][ T5932] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc17154c60 [ 1207.558514][ T5932] R13: 00007ffc17154c50 R14: 0000000000000000 R15: 00007ffc17154c60 [ 1207.580530][ T5932] memory: usage 960kB, limit 0kB, failcnt 458564 [ 1207.600751][ T5932] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1207.612147][ T5932] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1207.634348][ T5932] Memory cgroup stats for /syz5: cache:60KB rss:4KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4KB inactive_file:116KB active_file:112KB unevictable:0KB [ 1207.666581][ T5932] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=5932,uid=0 [ 1207.687577][ T5932] Memory cgroup out of memory: Killed process 5932 (syz-executor.5) total-vm:72448kB, anon-rss:76kB, file-rss:34828kB, shmem-rss:0kB [ 1207.706058][ T1044] oom_reaper: reaped process 5932 (syz-executor.5), now anon-rss:0kB, file-rss:33932kB, shmem-rss:0kB [ 1209.954506][ T3468] device bridge_slave_1 left promiscuous mode [ 1209.960886][ T3468] bridge0: port 2(bridge_slave_1) entered disabled state [ 1210.015168][ T3468] device bridge_slave_0 left promiscuous mode [ 1210.021518][ T3468] bridge0: port 1(bridge_slave_0) entered disabled state [ 1213.746669][ T3468] device hsr_slave_1 left promiscuous mode [ 1213.789706][ T3468] device hsr_slave_0 left promiscuous mode [ 1213.858966][ T3468] team0 (unregistering): Port device team_slave_1 removed [ 1213.890472][ T3468] team0 (unregistering): Port device team_slave_0 removed [ 1213.913693][ T3468] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1213.961960][ T3468] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1214.118974][ T3468] bond0 (unregistering): Released all slaves 10:50:30 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x5}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) 10:50:30 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:50:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:50:30 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x9}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) 10:50:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000100)=ANY=[]}, 0x8000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{&(0x7f0000000300)="b678b7fa325606000000bd8a0098e785a52188812b0d2075018500000000d90d7a187e641eb729c66d0692fb82c1381d1bd06748093802275f72953520db9d61e901521eeb082adb43149a099cc8ffd0e639f649b644efd0fd43830d492660eb48a1ea04f07e4a53959d414598ba5dabaefcc6f92305bcfc8346c0b2de8674034426112fcffc3d54e33e800dc7c16ad91a8f2745527ec3f5adca5c62d8d1f504f912c8341090f91bddda982df673d3dcd219bc9f2361bcedd484787d658209275b744f310d4a5fd78f5e4c9c6e87e07b77be713c47d94e007048443a0eb784f599835d3cbcdb", 0xe6}], 0x1}, 0x4000001) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = gettid() perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x12f041d2, 0x9, 0x8, 0x8, 0x0, 0x3, 0x204, 0xd, 0x5, 0x7fffffff, 0x17, 0x1, 0x3, 0x26d, 0x4, 0x8000, 0x4, 0x55a0fb9d, 0x67, 0x80, 0x5, 0x80000000, 0x80, 0x3, 0x80, 0x1ff, 0x3, 0x80000001, 0x1, 0x9, 0x10001, 0x4874fcb9, 0x101, 0x9c0, 0x2, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000200), 0x3}, 0x400, 0x0, 0x82c, 0x9, 0x1, 0x2, 0xb10}, r3, 0x1, r2, 0x0) close(r2) r4 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r4, &(0x7f0000000880)={&(0x7f0000000400)=@caif=@dbg={0x25, 0x8, 0xb5}, 0x80, &(0x7f0000000940)=[{&(0x7f00000007c0)="94321e49aeb785006d28883cda09f4e7e731f417a66207d0414774c048cb2a7e617f307097146f2ca43d8747f928ddaaaf6e607f8f9bc7f4e41689effb48a4f97d797876634c1fc818969f37ba2b6ebdb44d707223a2b39dd82638a48bbdb9c6a8746e8375b63bd0df8227114139737925a70e5d74c1668a13659b0ae06dda373e88e0fedfcaa7", 0x87}], 0x1}, 0x4000) sendmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000100)=@in={0x2, 0x4e24}, 0x80, 0x0}, 0x24000080) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8953, &(0x7f0000000040)=0x2) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000000)) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b00)={r5, 0xc0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, &(0x7f00000008c0)={0x2, 0x4}, 0x0, 0x0, &(0x7f0000000980)={0x4, 0x6, 0x200, 0x3}, &(0x7f00000009c0)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=0x10000}}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000b40)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_type(r6, &(0x7f0000000b80)='threaded\x00', 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0xee000000, 0x0, 0x0, 0x0, &(0x7f00000004c0)={0x9, 0x3}, 0x0, 0x0, &(0x7f0000000500)={0x5, 0xa}, &(0x7f0000000540)=0x100, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x40}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0)=r7, 0x4) 10:50:30 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) [ 1258.349515][ T5958] __nla_validate_parse: 1 callbacks suppressed [ 1258.349525][ T5958] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:50:30 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:50:31 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, 0x0}, 0x0) [ 1258.706893][ T5960] device nr0 entered promiscuous mode [ 1258.716412][ T5956] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:50:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1258.867009][ T5970] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:50:31 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, 0x0}, 0x0) 10:50:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="fb0000002e000104bfa9d345e7eb8d99c1ffffffffffffff43bc59198183fe204ee2d7080000000600000000000000801d5291d76b8c67452107132daffa33021eb82169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c33b047f720f4e89978112322628c7c1fbab650cdcafa532d3524ea85b198cb49066bf549933875e91431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a861b9390ddbad539ef278168ac8d157a656737a7ac0226d366ccec93f9f070000000000008e9234feee7baa2acd2683d489", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:50:31 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, 0x0}, 0x0) [ 1259.184488][ T5981] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1259.327289][ T5985] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1259.349741][ T5954] device nr0 entered promiscuous mode [ 1259.791469][ T5991] IPVS: ftp: loaded support on port[0] = 21 [ 1259.916979][ T5991] chnl_net:caif_netlink_parms(): no params data found [ 1260.007709][ T5991] bridge0: port 1(bridge_slave_0) entered blocking state [ 1260.015157][ T5991] bridge0: port 1(bridge_slave_0) entered disabled state [ 1260.022995][ T5991] device bridge_slave_0 entered promiscuous mode [ 1260.031456][ T5991] bridge0: port 2(bridge_slave_1) entered blocking state [ 1260.038746][ T5991] bridge0: port 2(bridge_slave_1) entered disabled state [ 1260.046558][ T5991] device bridge_slave_1 entered promiscuous mode [ 1260.076057][ T5991] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1260.086937][ T5991] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1260.096126][ T3468] device bridge_slave_1 left promiscuous mode [ 1260.102421][ T3468] bridge0: port 2(bridge_slave_1) entered disabled state [ 1260.154545][ T3468] device bridge_slave_0 left promiscuous mode [ 1260.161045][ T3468] bridge0: port 1(bridge_slave_0) entered disabled state [ 1261.766204][ T3468] device hsr_slave_1 left promiscuous mode [ 1261.839441][ T3468] device hsr_slave_0 left promiscuous mode [ 1261.879356][ T3468] team0 (unregistering): Port device team_slave_1 removed [ 1261.891714][ T3468] team0 (unregistering): Port device team_slave_0 removed [ 1261.905703][ T3468] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1261.950487][ T3468] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1262.043093][ T3468] bond0 (unregistering): Released all slaves [ 1262.202728][ T5991] team0: Port device team_slave_0 added [ 1262.211017][ T5991] team0: Port device team_slave_1 added [ 1262.222377][ T5994] IPVS: ftp: loaded support on port[0] = 21 [ 1262.286561][ T5991] device hsr_slave_0 entered promiscuous mode [ 1262.323764][ T5991] device hsr_slave_1 entered promiscuous mode [ 1262.485052][ T5994] chnl_net:caif_netlink_parms(): no params data found [ 1262.608219][ T5994] bridge0: port 1(bridge_slave_0) entered blocking state [ 1262.622221][ T5994] bridge0: port 1(bridge_slave_0) entered disabled state [ 1262.631150][ T5994] device bridge_slave_0 entered promiscuous mode [ 1262.658857][ T5991] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1262.668577][ T5994] bridge0: port 2(bridge_slave_1) entered blocking state [ 1262.681501][ T5994] bridge0: port 2(bridge_slave_1) entered disabled state [ 1262.691212][ T5994] device bridge_slave_1 entered promiscuous mode [ 1262.721055][ T5991] 8021q: adding VLAN 0 to HW filter on device team0 [ 1262.732493][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1262.748235][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1262.789903][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1262.799394][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1262.817521][T10613] bridge0: port 1(bridge_slave_0) entered blocking state [ 1262.824699][T10613] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1262.838634][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1262.847943][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1262.862426][T10613] bridge0: port 2(bridge_slave_1) entered blocking state [ 1262.869799][T10613] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1262.883645][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1262.892727][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1262.935158][ T5994] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1262.952960][ T8936] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1262.962152][ T8936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1262.980767][ T8936] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1262.999596][ T8936] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1263.010951][ T8936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1263.031418][ T5991] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1263.050542][ T5991] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1263.061672][ T5994] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1263.085661][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1263.100406][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1263.156139][ T5994] team0: Port device team_slave_0 added [ 1263.164596][ T5991] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1263.182107][ T5994] team0: Port device team_slave_1 added [ 1263.306667][ T5994] device hsr_slave_0 entered promiscuous mode [ 1263.343887][ T5994] device hsr_slave_1 entered promiscuous mode [ 1263.499865][ T5994] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1263.529587][ T5994] 8021q: adding VLAN 0 to HW filter on device team0 [ 1263.538045][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1263.546750][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1263.565444][ T5942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1263.574741][ T5942] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1263.583081][ T5942] bridge0: port 1(bridge_slave_0) entered blocking state [ 1263.590209][ T5942] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1263.598161][ T6002] device nr0 entered promiscuous mode [ 1263.613802][T15778] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1263.624828][T15778] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1263.633888][T15778] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1263.642623][T15778] bridge0: port 2(bridge_slave_1) entered blocking state [ 1263.649812][T15778] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1263.658774][T15778] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1263.674483][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1263.684811][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1263.694282][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1263.713669][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1263.721791][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1263.731722][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1263.741140][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1263.757563][ T5994] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1263.769832][ T5994] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1263.780955][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1263.822730][ T5994] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1264.047352][ T6010] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1264.057918][ T6010] CPU: 0 PID: 6010 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1264.065858][ T6010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1264.076049][ T6010] Call Trace: [ 1264.079345][ T6010] dump_stack+0x172/0x1f0 [ 1264.083703][ T6010] dump_header+0x10f/0xb6c [ 1264.088158][ T6010] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1264.094023][ T6010] ? ___ratelimit+0x60/0x595 [ 1264.098723][ T6010] ? do_raw_spin_unlock+0x57/0x270 [ 1264.103952][ T6010] oom_kill_process.cold+0x10/0x15 [ 1264.109113][ T6010] out_of_memory+0x79a/0x1280 [ 1264.113837][ T6010] ? oom_killer_disable+0x280/0x280 [ 1264.119160][ T6010] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1264.124728][ T6010] ? memcg_event_wake+0x230/0x230 [ 1264.129785][ T6010] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1264.135635][ T6010] ? cgroup_file_notify+0x140/0x1b0 [ 1264.140857][ T6010] memory_max_write+0x22f/0x390 [ 1264.145723][ T6010] ? mem_cgroup_write+0x360/0x360 [ 1264.150792][ T6010] ? mem_cgroup_write+0x360/0x360 [ 1264.155865][ T6010] cgroup_file_write+0x241/0x790 [ 1264.161363][ T6010] ? mem_cgroup_write+0x360/0x360 [ 1264.166499][ T6010] ? kill_css+0x380/0x380 [ 1264.170892][ T6010] ? kill_css+0x380/0x380 [ 1264.175326][ T6010] kernfs_fop_write+0x2b8/0x480 [ 1264.180396][ T6010] __vfs_write+0x8a/0x110 [ 1264.184741][ T6010] ? kernfs_fop_open+0xd80/0xd80 [ 1264.189713][ T6010] vfs_write+0x20c/0x580 [ 1264.194270][ T6010] ksys_write+0x14f/0x290 [ 1264.198897][ T6010] ? __ia32_sys_read+0xb0/0xb0 [ 1264.203697][ T6010] ? do_syscall_64+0x26/0x680 [ 1264.208398][ T6010] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1264.214496][ T6010] ? do_syscall_64+0x26/0x680 [ 1264.219213][ T6010] __x64_sys_write+0x73/0xb0 [ 1264.223836][ T6010] do_syscall_64+0xfd/0x680 [ 1264.228373][ T6010] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1264.234274][ T6010] RIP: 0033:0x4592c9 [ 1264.238223][ T6010] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1264.257856][ T6010] RSP: 002b:00007f74b8ea3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1264.266300][ T6010] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 1264.276565][ T6010] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 1264.284987][ T6010] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1264.293224][ T6010] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f74b8ea46d4 [ 1264.301295][ T6010] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 1264.313209][ T6010] memory: usage 5320kB, limit 0kB, failcnt 458565 [ 1264.319853][ T6010] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1264.327888][ T6010] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1264.335651][ T6010] Memory cgroup stats for /syz5: cache:60KB rss:4156KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4156KB inactive_file:116KB active_file:112KB unevictable:0KB [ 1264.362890][ T6010] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=6008,uid=0 [ 1264.392303][ T6010] Memory cgroup out of memory: Killed process 6008 (syz-executor.5) total-vm:72580kB, anon-rss:4232kB, file-rss:35744kB, shmem-rss:0kB [ 1264.419274][ T1044] oom_reaper: reaped process 6008 (syz-executor.5), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB 10:50:37 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x5}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) 10:50:37 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80}, 0x0) 10:50:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:50:37 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x85', 0x2181004, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x2a, &(0x7f0000000940)=ANY=[@ANYBLOB="00000000004702edbfedad000080000000000000000005a018000059f841dff4000000950000001c800000000000c09baa220c12f6adc8b35f2304013c93d8e2499c8a5e8840e5c4bbce2ac8d912f5625b26e7a78b5d160de0f23973f53a46928b50d3a8ec39e7c8758529ba5555210a5e0f8cf04d07a4c02b564f0028665b2f5d2f23c54d2f9f82aecbe1a93af2d971ee843ae18e6da0a808ba8c1aa5b57de3fe7ad8b556ffd7199fb69e077d0ab5636411332b7be72f56a9cf5918b8091826a50c1b9553ca4b9ec26bc0a7b349568ac5a9e4219b1b8f727175c61e49a13a2362f6de77715f3ffaa3b1f2216793675e181fce7089cf07a307618bddae8f0831ab7572721b48d5e169df5b662f16bd618c8ac392ad30a00ec3b51a158e9c0c9da7815996030f82c2168093d49ea736d23806f3a06acc5e7e7ae97f2ca359327bab748731819043f418bdc54efaf65395312d1208867720"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, 0x0) close(r5) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000340)={r6, r4, 0x1a, 0x2}, 0x10) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$TUNGETFILTER(r7, 0x801054db, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000540)={'dummy0\x00', 0x8000}) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000000)=0x100) ioctl$TUNSETOFFLOAD(r7, 0x400454d0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'veth0_to_hsr\x00', 0x400}) ioctl$TUNSETVNETBE(r7, 0x400454de, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0xf547, 0x7fffffff, 0x0, 0x9, 0x0, 0xffff, 0x80, 0x4, 0x5, 0x6, 0x0, 0x5, 0x0, 0x9, 0x47ba6378, 0x4, 0x3, 0x1c00000000000000, 0xbd95, 0x8, 0x7, 0x5, 0x1, 0x8001, 0x3e, 0x4b8, 0x3, 0x618, 0xff, 0x8, 0x4, 0x8fd, 0x7, 0x7, 0x6, 0x9, 0x0, 0x4b, 0x4, @perf_config_ext={0x9, 0xffffffff}, 0x6000, 0x401, 0x15c9, 0x2, 0x2, 0x6}, 0xffffffffffffffff, 0x5, r1, 0xb) r8 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r8, &(0x7f0000000500)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000000c0), 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='posix_acl_accessself\x00') 10:50:37 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0xa}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) 10:50:37 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x7fc, 0xffffffffffffff01, 0x80000001, 0x4, 0x0, 0x10001, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) [ 1264.556751][ T5994] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1264.591293][ T5994] CPU: 1 PID: 5994 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1264.599232][ T5994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1264.609314][ T5994] Call Trace: [ 1264.612629][ T5994] dump_stack+0x172/0x1f0 [ 1264.617020][ T5994] dump_header+0x10f/0xb6c [ 1264.621488][ T5994] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1264.627325][ T5994] ? ___ratelimit+0x60/0x595 [ 1264.631934][ T5994] ? do_raw_spin_unlock+0x57/0x270 [ 1264.637076][ T5994] oom_kill_process.cold+0x10/0x15 [ 1264.642218][ T5994] out_of_memory+0x79a/0x1280 [ 1264.646925][ T5994] ? lock_downgrade+0x880/0x880 [ 1264.652087][ T5994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1264.658362][ T5994] ? oom_killer_disable+0x280/0x280 [ 1264.663596][ T5994] ? find_held_lock+0x35/0x130 [ 1264.668573][ T5994] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1264.674149][ T5994] ? memcg_event_wake+0x230/0x230 [ 1264.679213][ T5994] ? do_raw_spin_unlock+0x57/0x270 [ 1264.684352][ T5994] ? _raw_spin_unlock+0x2d/0x50 [ 1264.690030][ T5994] try_charge+0x1042/0x1410 [ 1264.694585][ T5994] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1264.700158][ T5994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1264.706429][ T5994] ? kasan_check_read+0x11/0x20 [ 1264.711332][ T5994] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1264.716913][ T5994] mem_cgroup_try_charge+0x24d/0x5e0 [ 1264.722237][ T5994] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1264.727902][ T5994] wp_page_copy+0x416/0x1770 [ 1264.732617][ T5994] ? do_wp_page+0x486/0x1500 [ 1264.737272][ T5994] ? pmd_pfn+0x1d0/0x1d0 [ 1264.741552][ T5994] ? lock_downgrade+0x880/0x880 [ 1264.746451][ T5994] ? swp_swapcount+0x540/0x540 [ 1264.751243][ T5994] ? do_raw_spin_unlock+0x57/0x270 [ 1264.756399][ T5994] ? kasan_check_read+0x11/0x20 [ 1264.761270][ T5994] ? do_raw_spin_unlock+0x57/0x270 [ 1264.766435][ T5994] do_wp_page+0x48e/0x1500 [ 1264.770892][ T5994] ? finish_mkwrite_fault+0x540/0x540 [ 1264.776306][ T5994] __handle_mm_fault+0x22e3/0x3eb0 [ 1264.781454][ T5994] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1264.787036][ T5994] ? find_held_lock+0x35/0x130 [ 1264.791836][ T5994] ? handle_mm_fault+0x292/0xa90 [ 1264.796822][ T5994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1264.803816][ T5994] ? kasan_check_read+0x11/0x20 [ 1264.808695][ T5994] handle_mm_fault+0x3b7/0xa90 [ 1264.814618][ T5994] __do_page_fault+0x5ef/0xda0 [ 1264.819415][ T5994] do_page_fault+0x71/0x57d [ 1264.823936][ T5994] ? page_fault+0x8/0x30 [ 1264.828201][ T5994] page_fault+0x1e/0x30 [ 1264.832368][ T5994] RIP: 0033:0x4303a6 [ 1264.836283][ T5994] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 46 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 bc 4b 64 00 85 c0 0f 84 [ 1264.856417][ T5994] RSP: 002b:00007fffb4f61060 EFLAGS: 00010206 [ 1264.862596][ T5994] RAX: 0000000000019691 RBX: 0000000000714640 RCX: 0000000000008041 [ 1264.870590][ T5994] RDX: 0000555557236930 RSI: 000055555723e970 RDI: 0000000000000003 [ 1264.878583][ T5994] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555557235940 [ 1264.886661][ T5994] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000714698 [ 1264.894650][ T5994] R13: 0000000000714698 R14: 0000000000000000 R15: 0000000000002710 [ 1264.918182][ T6016] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1264.926197][ T6014] device nr0 entered promiscuous mode [ 1264.962807][ T6022] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1264.967390][ T5994] memory: usage 932kB, limit 0kB, failcnt 458573 [ 1264.980498][ T5994] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1264.989538][ T5994] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 10:50:37 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80}, 0x0) [ 1264.996983][ T5994] Memory cgroup stats for /syz5: cache:60KB rss:0KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:0KB inactive_file:116KB active_file:112KB unevictable:0KB [ 1265.020290][ T5994] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=5994,uid=0 [ 1265.038802][ T5994] Memory cgroup out of memory: Killed process 5994 (syz-executor.5) total-vm:72448kB, anon-rss:72kB, file-rss:34828kB, shmem-rss:0kB [ 1265.053851][ T1044] oom_reaper: reaped process 5994 (syz-executor.5), now anon-rss:0kB, file-rss:33932kB, shmem-rss:0kB 10:50:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1265.108802][ T6025] device nr0 entered promiscuous mode 10:50:37 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80}, 0x0) [ 1265.258450][ T6032] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:50:37 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) 10:50:37 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) 10:50:37 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) [ 1265.806985][ T6032] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:50:38 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x4, 0x7, 0x9}, 0x3c) r0 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) r1 = gettid() perf_event_open(&(0x7f0000000080)={0x7, 0x70, 0x0, 0x20, 0x6, 0xfffffffffffffbbe, 0x0, 0x2, 0x40021, 0x7, 0x1, 0x401, 0x31, 0x60000000000000, 0x9, 0x4f, 0xffffffffffff7fff, 0x7fff, 0x1000, 0x0, 0x8, 0x81, 0xdc8, 0x0, 0x3, 0x4, 0xff, 0x40, 0x6, 0x100000001, 0x1ff, 0x2, 0xffffffff, 0x3, 0x3a88, 0x100, 0x80000000, 0x3f, 0x0, 0x2, 0x6, @perf_config_ext={0x0, 0x1f}, 0x100, 0x9, 0x5, 0x7, 0x401, 0xffffffffffff44ad, 0xffffffffffff8c06}, r1, 0x6, 0xffffffffffffff9c, 0x2) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x400000, 0x0, 0x20820000, r0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffff9c, 0x28, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r2, 0x5, 0x8}, 0xc) 10:50:38 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)}], 0x1}, 0x0) 10:50:38 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x7fc, 0xffffffffffffff01, 0x80000001, 0x4, 0x0, 0x10001, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) [ 1266.224923][ T6023] device nr0 entered promiscuous mode 10:50:39 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x81, 0x0, 0x0, 0x101, 0x800, 0x4, 0x3ff, 0x0, 0x0, 0x7, 0x0, 0x1, 0x9, 0x0, 0x7, 0xffffffffffffffe0, 0xa48e, 0x9, 0x0, 0x2, 0x4, 0x10000, 0x0, 0x0, 0x71a9, 0x0, 0x7, 0x40000000000, 0x0, 0x0, 0x6294, 0x4, 0x800, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x40, 0x2}, r1, 0x8, r0, 0x3) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000002700050ad25a80648c63940d0124fc0010000a400a000000053582c137153e370900088004001700d1bd", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) 10:50:39 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0xb}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) 10:50:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="fb0000002e000104bfa9d345e7eb8d99c1ffffffffffffff43bc59198183fe204ee2d7080000000600000000000000801d5291d76b8c67452107132daffa33021eb82169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c33b047f720f4e89978112322628c7c1fbab650cdcafa532d3524ea85b198cb49066bf549933875e91431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a861b9390ddbad539ef278168ac8d157a656737a7ac0226d366ccec93f9f070000000000008e9234feee7baa2acd2683d489", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:50:39 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)}], 0x1}, 0x0) 10:50:39 executing program 2: socket$kcm(0x10, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000fc0)={0x0, 0x70, 0x100000000, 0x6, 0x1, 0x0, 0x0, 0x4, 0x100, 0x0, 0x6, 0x0, 0x0, 0x2, 0x5, 0x10000, 0x1, 0x100000000, 0x0, 0x2, 0x0, 0x2, 0x9, 0xf68a, 0x0, 0x1, 0x1ff, 0x0, 0x0, 0x8, 0xffffffff, 0x400, 0x3ff, 0x2faa, 0x3, 0x7ff, 0x9, 0x5, 0x0, 0x101, 0x5, @perf_config_ext={0x4, 0x489e}, 0x8, 0x0, 0x8, 0x0, 0x6, 0x5, 0x400}, 0xffffffffffffffff, 0x6, r0, 0x4) openat$cgroup_int(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="0070696473202d6d656d6f7279202b6d656d6f7279202b6d656d6f9e37c1551980c21fc3ecae663404f71d02dc786bc1bd344ee61fed582d31206fbd345cc835a9f484af619547c87cdd46fcef5fe07a9f8edc02dbf3fae561426db9a52330796a2cddc9c68a8b2bedafe68720b2dcf29471586196d2a151c468c3a4941ff23bb4541743eab923de235e59fe26cad42ac9e78562f8654f8784b7e37f2939a37dc78360eab4e688e1781a95be962234569c91c5f650e25d3df9b627a01f6f15cd6d3921d56cd73ba8c27b6dddd6ccbf8e3396b6add99cc2544352dc04ed6e7ff392e241eb05260623ed309ee3e638648ff2182f91c63505290363d5140f8102d4a70ecf29dedfc9404dc1f6a57cf9639d4f51621c129c0e6221965099933771a52f44716ae66a940257b8dc61ac07f82f488f57c44c8b99c43326397200a6f1cc4d0fcf49359b969c697730e1ef47dc9b071d7fdee5c893414e890192bdafd1925e96da9fb19bbccc289396d9a2935e4b761deec43ca31011b4a5e0e43256724872c045de223c26748fb08a4b7f091919b5513d928c46842ad12673e7411835ab2ef78e1c7b6ee3715bad2cf2ab40a4934425b178cd87729fbea5b9a60be2aedc123d4a3e93de015e"], 0x1c8) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000080)=0xa00000000000000, 0x297ef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001040)={0xfffffffffffffffe, r2}, 0xfffffffffffffd0c) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000080)='memory.high\x00', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) [ 1266.756584][ T6064] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1266.827658][ T6071] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:50:39 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)}], 0x1}, 0x0) [ 1267.039344][ T6083] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:50:39 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163", 0x24}], 0x1}, 0x0) 10:50:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:50:39 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000180)=@generic={0x10, "40270b152e4779ee1b6574193c8f958e02f161177ed61164b9c28c8e868ebdb09b3022ac4a1de636a3fa6dbb0b593e18b57d4f9aad90dca53175eb08e1e998a14145cbbf4903f4eb0736194ddbfbfd7a563aa00b079093af81af0761b999a0b504b66972378f49482c36f38887377f98d7f5bba6009c7f04f4e8268f371f"}, 0x80, &(0x7f00000025c0)=[{&(0x7f0000000200)="1f664676f6e771b532c4d687c751684c4ffae63b016be7a859bfed7ab3321987753c4bf98270a94c0f8325d229a82061ae36c3c8de10eb2b14212b7d7d052c7dbb86", 0x42}, {&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001280)="e462c2f30e19e80ebacc28d6ca1e1b543d3caf976cc33edb28cfc188f439e4c37ae860cf62e7dcaaf7b9ae4651397d90730ceaff2e9f34955fc6da17b0f9df8d7dda92bc4f52d9473f5bf20e78e01a99d50373c452ad0755be436d311046179a4a97fc8abaf76f851d4b917ed98f", 0x6e}, {&(0x7f0000001300)="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", 0x1000}, {&(0x7f0000002300)="34df22b497d07765f1895d8d827b357f08c8e61361547c25e5100bb9adb60d97ea7267bfc30df9a356ecae31a3df589d1ebbb8535af13fe15758b203b9e91c752455747279478f7bfeb1a0b5406d221771829ce26f469c77f4eef7d137bb41f1c1f81fda1a840f6aee88db668d917f914142f8e0cd3cbcca4c11d5ba2c7a8a6ba41e18be19fb7ce3b360bd9288c9dc4b901a6a66e04ef0adef754315b80ed5124753f75cca64a3e03f7435d43e0d4b4da232a80c001bfa5c9df79f9745f62ae22dfc90870089a494e31372ca7de21d8ebaa61781790189c27e74c7324c140416a391cf96f377e92f4508", 0xea}, {&(0x7f0000002400)="87e163cd88b34519adbe3ae2a3f3df54e04206f02766eabc28729a3014ce5e784e2e43084c0cfb3e1a2361f01195e186bb26f79d8ac0c1a7a63fe7776dc45817b7083907452075453de72e79606636662d90093ed445e619a4b00f8244aefbdb48408a9507fa866415ca4b3eacaec2450dad4a39ccdb", 0x76}, {&(0x7f0000002480)="8625b0957088533937ccbcea0a47f9f2cf02fca4e94059f7654b6a230d70d8470ba956bdb117ffbf65f753191586dbe71c9ca5c142079ccfb74baf64f7ab721060be34c4389d", 0x46}, {&(0x7f0000002500)="fd72816131b5122be7e219a59bcf9885d4e9f88bf9be2e7d796269e0145854c0b4f645e7954867b57df29e3a2bbdbae08c2ec52ad000d1b2b479e7acdc103303dd5a389de5d87e7c3bb42dd206f642bfec09835ac53247a8be8487ff41a3be33fbfcc6522b727e58a74cf48137950fd6221edce577645d416622296576f383c78ccea2a738e52bef16af53ecc5fb2eb75b22a4731ae8eb20a8aaff1b27c95a1351f11eab63fc26e7b71a28f05f8eda337569b7bc9257dc7abcd59b3a303d7a8c", 0xc0}], 0x8, &(0x7f0000002640)=[{0x38, 0x7ec4f5609e066153, 0xffffffff80000001, "3f23a9cd55f39626efabd68d20b2958306237667611828630209c06b011b348a4c"}, {0x1010, 0x1ff, 0x1f, "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"}, {0x98, 0x119, 0x2, "36366fd52b4c23c3a9e00d1b739c231da6388726287a9c0e3a649d09c17e7e854c4a75e37bd6fd5ffe64fdd12992662f0ebb7998a51a70cd80ccc93768cf4609965360bb0781dfe71d49e0298623dc0a1a5e234cd895993c175e787ebac0647a86216e17d49e2bdf6b09b25600c5455d01821bb54f2940e4ae74cff41b04c757f1"}, {0x48, 0x101, 0xfe44, "24ecf90a667f12ded33683f0370700335c27a30549f1fa491b91dfe2b46e88394b0ce464c0dfe202cebb5ae9dead13ef5ab86a"}, {0xd0, 0x10b, 0x101, "e8638a7ef17db5fecf79b2181f086ec962b33c52d376259d20cdfabb320a3de55288b173a3a404f881571da5364d83b4043c88263fa6be824a7ba5637a07174a013a59af255e794ea42e5e767b38c4a6c59cc2567ec704d42581f4a47d4b0e7c25de0bbfd98ae021f12405ef70557b3642ab0b1eedf732b3a6d06c3ebff02459362a8d137d5017c1fe47ba881e00cb0962f15cf4eb4e63f3a56f747c254ba5fc703f1f77d43f1aec6384e3045b2bde7cb1061853b234b195b4"}, {0xe0, 0x0, 0x9, "4eb9fa7731aa8b9078eaec35004bd96cf0c65224d863101918886bf0f54e8aacdd189d8c426b2d5e05bc0a1cdf8df8190d107af9b2262a9b0d5e6147978756049e26edc794bdebfa9536886f6e2579ba97691e39d7ca52c456ddad5aea24a5e46f1cdb7b877a1ea521b1a92d534eadae9ae3d64cc65e89a1a8a5ef232d0cf66812152f5d732a36b20af924a7a9099452ed44f8b111133aba5029917519273433b8d2cd42c6df9b83ccf9e97392b15a9d423a0aaa348e3a7cbea4bdfc801133a9df4ad5bd279c25b1ae2d"}], 0x12d8}, 0x80) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x10, 0x2, 0x4) r2 = socket$kcm(0x11, 0x4000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x107, 0xe, &(0x7f0000000080), 0x4) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="39000000140081ae00003c9733f5f087110008abca9b4e7d0f6298db85d0b0e62bdbb7d553b4e921556b3d5df500c250825702000000000000", 0x39}], 0x1}, 0x0) [ 1267.210752][ T6091] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:50:39 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163", 0x24}], 0x1}, 0x0) [ 1267.265542][ T6064] netlink: 'syz-executor.1': attribute type 8 has an invalid length. [ 1267.394179][ T6098] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1267.402666][ T6098] netlink: 'syz-executor.1': attribute type 8 has an invalid length. [ 1267.412610][ T6081] device nr0 entered promiscuous mode 10:50:39 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x31, 0x0, 0x3aa) [ 1267.842827][ T6106] IPVS: ftp: loaded support on port[0] = 21 [ 1267.873172][ T6081] device nr0 entered promiscuous mode [ 1268.110446][ T6106] chnl_net:caif_netlink_parms(): no params data found [ 1268.142357][ T6106] bridge0: port 1(bridge_slave_0) entered blocking state [ 1268.149765][ T6106] bridge0: port 1(bridge_slave_0) entered disabled state [ 1268.158499][ T6106] device bridge_slave_0 entered promiscuous mode [ 1268.169373][ T2636] device bridge_slave_1 left promiscuous mode [ 1268.176961][ T2636] bridge0: port 2(bridge_slave_1) entered disabled state [ 1268.234662][ T2636] device bridge_slave_0 left promiscuous mode [ 1268.240985][ T2636] bridge0: port 1(bridge_slave_0) entered disabled state [ 1269.906723][ T2636] device hsr_slave_1 left promiscuous mode [ 1269.949061][ T2636] device hsr_slave_0 left promiscuous mode [ 1270.017587][ T2636] team0 (unregistering): Port device team_slave_1 removed [ 1270.029762][ T2636] team0 (unregistering): Port device team_slave_0 removed [ 1270.043153][ T2636] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1270.081037][ T2636] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1270.182000][ T2636] bond0 (unregistering): Released all slaves [ 1270.279751][ T6106] bridge0: port 2(bridge_slave_1) entered blocking state [ 1270.287052][ T6106] bridge0: port 2(bridge_slave_1) entered disabled state [ 1270.295353][ T6106] device bridge_slave_1 entered promiscuous mode [ 1270.312705][ T6106] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1270.327103][ T6106] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1270.345476][ T6106] team0: Port device team_slave_0 added [ 1270.353106][ T6106] team0: Port device team_slave_1 added [ 1270.426717][ T6106] device hsr_slave_0 entered promiscuous mode [ 1270.463897][ T6106] device hsr_slave_1 entered promiscuous mode [ 1270.549309][ T6106] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1270.562378][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1270.573376][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1270.581540][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1270.593829][ T6106] 8021q: adding VLAN 0 to HW filter on device team0 [ 1270.605443][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1270.615025][T10613] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1270.623779][T10613] bridge0: port 1(bridge_slave_0) entered blocking state [ 1270.631001][T10613] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1270.669542][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1270.683833][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1270.693191][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1270.701904][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 1270.709058][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1270.743705][ T8936] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1270.760334][ T8936] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1270.780356][ T6106] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1270.792310][ T6106] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1270.805451][ T8936] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1270.814483][ T8936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1270.823250][ T8936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1270.843510][ T8936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1270.857437][ T6106] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1271.174602][ T6122] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1271.192251][ T6122] CPU: 0 PID: 6122 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1271.200292][ T6122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1271.210372][ T6122] Call Trace: [ 1271.213698][ T6122] dump_stack+0x172/0x1f0 [ 1271.218076][ T6122] dump_header+0x10f/0xb6c [ 1271.222532][ T6122] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1271.228546][ T6122] ? ___ratelimit+0x60/0x595 [ 1271.233263][ T6122] ? do_raw_spin_unlock+0x57/0x270 [ 1271.238421][ T6122] oom_kill_process.cold+0x10/0x15 [ 1271.243602][ T6122] out_of_memory+0x79a/0x1280 [ 1271.248475][ T6122] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1271.253981][ T6122] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1271.259478][ T6122] ? oom_killer_disable+0x280/0x280 [ 1271.264722][ T6122] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1271.270404][ T6122] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1271.276599][ T6122] ? memcg_event_wake+0x230/0x230 [ 1271.291487][ T6122] ? retint_kernel+0x2b/0x2b [ 1271.296183][ T6122] memory_max_write+0x22f/0x390 [ 1271.301165][ T6122] ? mem_cgroup_write+0x360/0x360 [ 1271.306221][ T6122] ? lock_acquire+0x16f/0x3f0 [ 1271.311282][ T6122] ? kernfs_fop_write+0x227/0x480 [ 1271.316621][ T6122] cgroup_file_write+0x241/0x790 [ 1271.321688][ T6122] ? mem_cgroup_write+0x360/0x360 [ 1271.326943][ T6122] ? kill_css+0x380/0x380 [ 1271.331348][ T6122] ? kill_css+0x380/0x380 [ 1271.335739][ T6122] kernfs_fop_write+0x2b8/0x480 [ 1271.340648][ T6122] __vfs_write+0x8a/0x110 [ 1271.347276][ T6122] ? kernfs_fop_open+0xd80/0xd80 [ 1271.352257][ T6122] vfs_write+0x20c/0x580 [ 1271.356661][ T6122] ksys_write+0x14f/0x290 [ 1271.361332][ T6122] ? __ia32_sys_read+0xb0/0xb0 [ 1271.366237][ T6122] ? do_syscall_64+0x26/0x680 [ 1271.371309][ T6122] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1271.377671][ T6122] ? do_syscall_64+0x26/0x680 [ 1271.382420][ T6122] __x64_sys_write+0x73/0xb0 [ 1271.387666][ T6122] do_syscall_64+0xfd/0x680 [ 1271.393175][ T6122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1271.399108][ T6122] RIP: 0033:0x4592c9 [ 1271.403033][ T6122] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1271.422922][ T6122] RSP: 002b:00007fec9b47cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1271.431376][ T6122] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 1271.439382][ T6122] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 1271.447381][ T6122] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1271.455375][ T6122] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fec9b47d6d4 [ 1271.463383][ T6122] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 1271.483620][ T6122] memory: usage 5416kB, limit 0kB, failcnt 458574 [ 1271.501177][ T6122] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1271.509697][ T6122] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1271.524468][ T6122] Memory cgroup stats for /syz5: cache:60KB rss:4236KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4236KB inactive_file:116KB active_file:112KB unevictable:0KB [ 1271.554131][ T6122] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=6121,uid=0 [ 1271.577576][ T6122] Memory cgroup out of memory: Killed process 6121 (syz-executor.5) total-vm:72712kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB [ 1271.603005][ T1044] oom_reaper: reaped process 6121 (syz-executor.5), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB 10:50:44 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163", 0x24}], 0x1}, 0x0) 10:50:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="fb0000002e000104bfa9d345e7eb8d99c1ffffffffffffff43bc59198183fe204ee2d7080000000600000000000000801d5291d76b8c67452107132daffa33021eb82169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c33b047f720f4e89978112322628c7c1fbab650cdcafa532d3524ea85b198cb49066bf549933875e91431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a861b9390ddbad539ef278168ac8d157a656737a7ac0226d366ccec93f9f070000000000008e9234feee7baa2acd2683d489", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:50:44 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x7fc, 0xffffffffffffff01, 0x80000001, 0x4, 0x0, 0x10001, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 10:50:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\x00;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddpr\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) close(r2) sendmsg$kcm(r2, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000002010000000100ec00000091321ea2e804b73b7db19400fc8f7b4128188be451239c1df6a8d8c6a8ad35d573d0be309c6676da8b5e1544073c3ae3c7695dd1382647"], 0x14}, 0x0) r3 = socket$kcm(0xa, 0x2, 0x0) close(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000100000001000000ec00000000000000ea8bc546a04b07fbdac237f3e4cb4ee3f4424f936ec929f2f9c81f6e1c80abd63502366a698ead179ce758f9df7ac9ab913ecd2b436d14e7aa7b79300f1f5368fa1bd9d5c19dc4bd9172acb18ab003122336bf4ec939545a190993"], 0x18}, 0x0) recvmsg$kcm(r2, &(0x7f00000003c0)={0x0, 0x1000000, 0x0, 0x0, &(0x7f0000000440)=""/134, 0x86}, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) recvmsg(0xffffffffffffffff, &(0x7f0000017d00)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, r4, {0x2, 0x4e24, @loopback}, 0x4, 0x2, 0x4, 0x1}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000980)="44471c501e03230ed93443bd3a4b1f080fe50f03c9af3edd795084950d7a8a6033033efb80692640156caeb96e8d40ede99e7428233d4eeaeff74721200f1d6867cc8b0ef2ae4c7f540de15a56abf9bb3fc9f06f9c77506d93b2e80dceb1fe7889d9fd69b9a6e754826fe9d04bd8c15e05a58e4ab68ad6e63de3b00be4cf44f1005cc55a60864ba5781153a58e53f54230b42030b371956767931fbd26f33f282215b3842d032b318c73c863cbde7630aadf59c53edb863a023566f80f22a45f7c7b300dccd3d697a1e1cb27b413406308585c", 0xd3}], 0x1}, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r2, &(0x7f0000002d00)='!', 0x0}, 0x18) socketpair(0xe, 0x4, 0x1, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000002c0)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x20000000000002f1, 0x0, 0x0, 0x2400, 0x1000, &(0x7f00000017c0)=""/4096, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x2b3}, 0x70) 10:50:44 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r0, 0xc, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r0, r0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f00000000c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x6, 0x1}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0xf, 0x57e, 0x2}, &(0x7f0000000200)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x6}}, 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000380)=0x9e93) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) socket$kcm(0x29, 0x7, 0x0) r3 = openat$cgroup_ro(r0, &(0x7f0000000400)='cgroup.events\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000440)={r3}) write$cgroup_int(r3, &(0x7f0000000480)=0x3, 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r3, 0x28, &(0x7f00000004c0)={0x0, 0x0}}, 0x10) sendmsg$inet(r2, &(0x7f0000001640)={&(0x7f0000000540)={0x2, 0x4e21, @local}, 0x10, &(0x7f0000001600)=[{&(0x7f0000000580)="59e43a0b11e5df0ea2b6e55821f4f140b0844dbbcf1ff193407217cb152934ab6b2aa693d6d1", 0x26}, {&(0x7f00000005c0)="ca726c99869c2ed2e1db68dc8dcb30479a0d63e7fbfaef3f7b4586af9ef7a26b14bac8505437e49040b21a36231e41df72281c62e2983fe871ad789b", 0x3c}, {&(0x7f0000000600)="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", 0x1000}], 0x3}, 0x20000000) r5 = openat$cgroup(r0, &(0x7f0000001680)='syz0\x00', 0x200002, 0x0) openat$cgroup(r5, &(0x7f00000016c0)='syz0\x00', 0x200002, 0x0) sendmsg$tipc(r0, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000001700)="21350bc479a47d6419f240f22068c0d7d9f4b4e2b0c04d07de71c99fa0b0fdb6b2e05182b205a126e8ee5aaaf45ca1d8b157957228fbebc78d435cd549761f399304b135b17821f2430b435bb5b7a5e71b4c64f2ab73a38190dfde62f4cf0a8073be7569407fedcc0a8d70ef1b54c8d5ecfe0704aaabb69bb8cfd6c2cab70fac9e08aa1fdc691a1c54e170b6c521ce0b7dc1406ad832c1515918f1fb1004a251aa111c08a8900eb45d7a03a1ffb54a0d5c0bd509b2efd932b58eb60623c24facef", 0xc1}], 0x1, &(0x7f0000001840)="387b2a68b274e2e70c08f527eeae954799cf6f59c0efd08bba8450446af62d5861bdcc4dc43f5887c9749cf6a61b7560adaf11beafa8c99ac0e166bb2aaf2abbc7bee9fa398d0da2c71830c9a2aae8e0b57da293511c988bb3e3027209213e9743261398b0c59b0a3a14c2606d9330320b3dacec8d87ea01c57b3123b4399e7454df23793ea06602835ca430149605bd524c73a98d4bb39764e0a39f9ca77fec0fe526575689f7a35102afca4bae48b361bbb31b846382d531a4d75d543a551b59ad0c78f512843395ac2ab67da68f419d48668adef1d13dd500101bb3c0151c", 0xe0, 0x4}, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) recvmsg$kcm(r3, &(0x7f000000bac0)={&(0x7f000000b880)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f000000ba00)=[{&(0x7f000000b900)=""/255, 0xff}], 0x1, &(0x7f000000ba40)=""/112, 0x70}, 0x2) bpf$PROG_LOAD(0x5, &(0x7f000000bb80)={0x4, 0x8, &(0x7f0000001980)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff}, [@map={0x18, 0xb, 0x1, 0x0, r0}, @generic={0x4, 0x1, 0x2, 0x6, 0x9}, @jmp={0x5, 0x5, 0x5, 0x0, 0xa, 0xfffffffffffffff8, 0xfffffffffffffffc}, @alu={0x7, 0x401, 0x0, 0x0, 0x5, 0xfffffffffffffff8, 0x4}]}, &(0x7f00000019c0)='syzkaller\x00', 0x8, 0xa2, &(0x7f0000001a00)=""/162, 0x41f00, 0x3, [], r6, 0x1b, 0xffffffffffffff9c, 0x8, &(0x7f000000bb00)={0x3, 0x1}, 0x8, 0x10, &(0x7f000000bb40)={0x5, 0x3, 0x6, 0x6}, 0x10}, 0x70) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f000000bc00)=r1, 0x4) r7 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f000000bc80)={r7, r0, 0x0, 0xb, &(0x7f000000bc40)='\\Tvboxnet1\x00', r1}, 0x30) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f000000bcc0)=0xffffffffffffff01) socket$kcm(0x29, 0x2, 0x0) openat$cgroup_type(r5, &(0x7f000000bd00)='cgroup.type\x00', 0x2, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup_ro(r5, &(0x7f000000bd40)='rdma.current\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f000000bd80)={r4, 0x100, 0x18}, 0xc) openat$tun(0xffffffffffffff9c, &(0x7f000000bdc0)='/dev/net/tun\x00', 0x400, 0x0) 10:50:44 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0xc}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) [ 1271.791247][ T6106] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1271.813290][ T6130] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1271.817166][ T6106] CPU: 1 PID: 6106 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1271.831028][ T6106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1271.831045][ T6106] Call Trace: [ 1271.844552][ T6106] dump_stack+0x172/0x1f0 [ 1271.848944][ T6106] dump_header+0x10f/0xb6c [ 1271.853421][ T6106] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1271.859263][ T6106] ? ___ratelimit+0x60/0x595 [ 1271.863879][ T6106] ? do_raw_spin_unlock+0x57/0x270 [ 1271.869037][ T6106] oom_kill_process.cold+0x10/0x15 [ 1271.874193][ T6106] out_of_memory+0x79a/0x1280 [ 1271.878989][ T6106] ? lock_downgrade+0x880/0x880 [ 1271.879006][ T6106] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1271.879025][ T6106] ? oom_killer_disable+0x280/0x280 [ 1271.879046][ T6106] ? find_held_lock+0x35/0x130 [ 1271.900680][ T6106] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1271.906292][ T6106] ? memcg_event_wake+0x230/0x230 [ 1271.911355][ T6106] ? do_raw_spin_unlock+0x57/0x270 [ 1271.916508][ T6106] ? _raw_spin_unlock+0x2d/0x50 [ 1271.921405][ T6106] try_charge+0x1042/0x1410 [ 1271.922619][ T6133] device nr0 entered promiscuous mode [ 1271.925956][ T6106] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1271.925976][ T6106] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1271.925993][ T6106] ? kasan_check_read+0x11/0x20 [ 1271.926013][ T6106] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1271.926033][ T6106] mem_cgroup_try_charge+0x24d/0x5e0 [ 1271.926056][ T6106] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1271.926077][ T6106] wp_page_copy+0x416/0x1770 [ 1271.926091][ T6106] ? do_wp_page+0x486/0x1500 [ 1271.926121][ T6106] ? pmd_pfn+0x1d0/0x1d0 [ 1271.978263][ T6106] ? lock_downgrade+0x880/0x880 [ 1271.983145][ T6106] ? swp_swapcount+0x540/0x540 [ 1271.987946][ T6106] ? do_raw_spin_unlock+0x57/0x270 [ 1271.993124][ T6106] ? kasan_check_read+0x11/0x20 [ 1271.998015][ T6106] ? do_raw_spin_unlock+0x57/0x270 [ 1272.003173][ T6106] do_wp_page+0x48e/0x1500 [ 1272.007628][ T6106] ? finish_mkwrite_fault+0x540/0x540 [ 1272.013046][ T6106] __handle_mm_fault+0x22e3/0x3eb0 [ 1272.018204][ T6106] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1272.023787][ T6106] ? find_held_lock+0x35/0x130 [ 1272.028581][ T6106] ? handle_mm_fault+0x292/0xa90 [ 1272.033578][ T6106] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1272.039873][ T6106] ? kasan_check_read+0x11/0x20 [ 1272.044851][ T6106] handle_mm_fault+0x3b7/0xa90 [ 1272.049656][ T6106] __do_page_fault+0x5ef/0xda0 [ 1272.054473][ T6106] do_page_fault+0x71/0x57d [ 1272.059006][ T6106] ? page_fault+0x8/0x30 [ 1272.063278][ T6106] page_fault+0x1e/0x30 [ 1272.067456][ T6106] RIP: 0033:0x4303a6 [ 1272.071374][ T6106] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 46 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 bc 4b 64 00 85 c0 0f 84 [ 1272.091005][ T6106] RSP: 002b:00007ffe2d3ef910 EFLAGS: 00010206 [ 1272.097441][ T6106] RAX: 0000000000019691 RBX: 0000000000714640 RCX: 0000000000008041 [ 1272.105584][ T6106] RDX: 0000555556a30930 RSI: 0000555556a38970 RDI: 0000000000000003 [ 1272.113660][ T6106] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555556a2f940 [ 1272.121652][ T6106] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000714698 [ 1272.129647][ T6106] R13: 0000000000714698 R14: 0000000000000000 R15: 0000000000002710 10:50:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:50:44 executing program 2: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x36, &(0x7f0000000200)=r0, 0x2e8) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @local, 0x5}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=':', 0x1}], 0x1}, 0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='memory.current\x00', 0x0, 0x0) r2 = openat$cgroup(r0, &(0x7f0000000800)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r2, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) [ 1272.177579][ T6106] memory: usage 984kB, limit 0kB, failcnt 458582 [ 1272.185643][ T6106] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1272.193942][ T6106] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1272.201009][ T6106] Memory cgroup stats for /syz5: cache:60KB rss:68KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:68KB inactive_file:116KB active_file:112KB unevictable:0KB [ 1272.264854][ T6140] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1272.311150][ T6106] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=6106,uid=0 [ 1272.345221][ T6106] Memory cgroup out of memory: Killed process 6106 (syz-executor.5) total-vm:72448kB, anon-rss:72kB, file-rss:34828kB, shmem-rss:0kB 10:50:44 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x3, 0x4, 0x4, 0x40, 0x0, 0xffffffffffffff9c}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) close(0xffffffffffffffff) r1 = socket$kcm(0x2, 0x3, 0x2) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400), 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0xc, 0x100000000000914, 0x1}, 0x2c) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) gettid() socket$kcm(0x29, 0x7, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r2, &(0x7f0000000000), 0x0}, 0x18) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r1}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x96}]}}, &(0x7f0000001140)=""/151, 0x2a, 0x97, 0x1}, 0x20) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000280)={r2, 0x0, 0x0}, 0x18) close(r4) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2c) r5 = socket$kcm(0x2, 0x2000000000000001, 0x0) sendmsg$kcm(r5, &(0x7f0000000380)={&(0x7f00000003c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x80, 0x0}, 0x2004000c) 10:50:44 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2", 0x36}], 0x1}, 0x0) [ 1272.374052][ T1044] oom_reaper: reaped process 6106 (syz-executor.5), now anon-rss:0kB, file-rss:33932kB, shmem-rss:0kB [ 1272.389704][ T6144] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:50:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:50:45 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2", 0x36}], 0x1}, 0x0) [ 1272.612605][ T6153] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:50:45 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2", 0x36}], 0x1}, 0x0) 10:50:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x0, 0xffffffffffffff01, 0x80000001, 0x4, 0x0, 0x10001, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 10:50:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:50:45 executing program 1: r0 = socket$kcm(0x29, 0xfffffffffffffffd, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r1, &(0x7f0000000200)="f21c", 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000280)='cpB1\x82\x12,\xf8\x18\x11c\x17\v\x95\xdc\xa3\x18b\xbeV\x18\r\xe0Zt\x00', 0x0, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000340)='cp\xaf#\x8b\xa6\x12\xb9\x81\xc8\xe4\x1c\xc4\n+\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_int(r5, &(0x7f0000000580)=0x7, 0x12) r6 = openat$cgroup_ro(r5, &(0x7f0000000140)='memory.stat\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000100)={r5}) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xe, 0x5c, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/739], 0x0, 0x1, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0xfddd, 0x10, 0x0}, 0x70) socket$kcm(0x29, 0x7, 0x0) r7 = getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffff7, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x800, 0x20000000, @perf_config_ext, 0x1411, 0xc92, 0x3e}, r7, 0x3, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r6, 0x800454d3, &(0x7f00000006c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) close(r1) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000e00)="7a5e16f4f33b675b69b5792c36e2610ff21453da138a00000000000008006399d2e060540394b794d1343d8805f65b7ddff866a800967eef2eb19f6b787fe026c9efdd458f46fe46132809092b092d1323b473c226ddb6f9e5b276a02194e59262cdd22f6ac2fbcb44416ed4", 0x1e}, {&(0x7f0000000dc0)="f9674b3c92849a583bdea658840e4824abb38bca37fe5ca45e24f22b53aec5e1579a3abe5b09b9e46c8ef0bf99f3346313968c961c185c76992e520aa517", 0x3e}, {&(0x7f0000000a80)="f0de89bacf8d3877c1ae7dbe5ddf39d5fa4969f0ef31ce008ca1653e4d97ce7a42a979d74bfbf7d51978cda322a7d5c243b423", 0x33}, {&(0x7f0000000ac0)="048c98426043420d044a28dec6d18a43971abd321497637f34f6787f0e6d5af471225d381b27176d70848edf9667837c6896ca3cffc5c0ff3b09f848f5ce97a57cb75bc74bd247cea43b6082b8384ac8321e381511c5cdfa9bb99954804c7b23e9627cd7ebbdc96a24ab8f09400970d683310b00a3ce1c60061f", 0x7a}, {&(0x7f0000000d00)="8f0bf9ea27107c13df59ab1082b9efea47706827c8eb84c1b4335d89b05fa01b93c81831810b6367b3c76803fd97a55f15490375e20a512bd589e181aeea0a913b4e0dbbb01a8b521e88286f61a9c695284e36fe5f9ee58e8856ac0145c36c1fb1d35a718a9a5dcc736735a5e1832f1fdcc1ad626b67037bf09c63dbd5b77d8d4040a9cc30fb60cdb54d6b58ed03b62bfdcdf7d71cf3a42ceb0988ad4f5223b988087d286369a12656e7f6ed", 0xac}], 0x5, &(0x7f0000000480), 0x0, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200091}) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000440)={r6, r5}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$TUNSETVNETLE(r8, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x0, &(0x7f0000000780)=ANY=[], 0x0}, 0x48) close(r9) socketpair(0x2000800000001, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r11, &(0x7f0000000400)=0x33, 0x12) close(r10) 10:50:45 executing program 2: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x297ef) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x200, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x2, 0x9af1}]}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000340)={&(0x7f0000000080)=@rc={0x1f, {0x0, 0x3, 0x5}}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000140)={r1}) [ 1272.977667][ T6133] device nr0 entered promiscuous mode [ 1273.102245][ T6178] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:50:45 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x90}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) 10:50:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x0, 0xffffffffffffff01, 0x80000001, 0x4, 0x0, 0x10001, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 10:50:45 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d0000000000", 0x3f}], 0x1}, 0x0) [ 1273.199754][ T6182] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:50:45 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000000)='cpuacct.stat\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000002680)='cpuacct.stat\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000026c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000002700)={r2}) 10:50:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="fb0000002e000104bfa9d345e7eb8d99c1ffffffffffffff43bc59198183fe204ee2d7080000000600000000000000801d5291d76b8c67452107132daffa33021eb82169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c33b047f720f4e89978112322628c7c1fbab650cdcafa532d3524ea85b198cb49066bf549933875e91431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a861b9390ddbad539ef278168ac8d157a656737a7ac0226d366ccec93f9f070000000000008e9234feee7baa2acd2683d489", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:50:45 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d0000000000", 0x3f}], 0x1}, 0x0) [ 1273.428854][ T6197] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:50:46 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x1b0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000002700050ad25a80648c63940d0124fc0010000b400a020000053582c137153e370900068004001700d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x200000000000000}, 0x0) 10:50:46 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d0000000000", 0x3f}], 0x1}, 0x0) [ 1273.726336][ T6208] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1273.776993][ T6208] netlink: 'syz-executor.2': attribute type 6 has an invalid length. 10:50:46 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000013000507ed008064d20010000100008000000ec00080000000000300f88000f01700d0bd002000000001", 0x2e}], 0x1}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg(r0, &(0x7f0000002e80)={&(0x7f0000000140)=@rxrpc=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e21, @local}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000280)="e495a09b756ab0464c04f3e5632ec43f0839ba0097dc6ec778d48e8170f449eaa5d1c60497e43e336393dde2ace2ec2448ea9193a541df430e2aa1fabf56707655f79bd8a456e77607fa2d36311caf6d4805c6510c92a94ad9f174ccfc6a25ea01d19115ded08a6b8feb8e65a7e32bf3880831a995a068fa5f411655a1dda7f4f6ee01aee0211ba659b5710b36303bf646a424b18059d2d65ad580539b60d160e0aab35cd084f60fa71d0eeb5bc57784fd7a141a", 0xb4}, {&(0x7f00000001c0)="c8800b6b9c29631237031962c81d33492f89b75c8732", 0x16}, {&(0x7f0000000340)="ac8746f8f0518becb58e7ad843073309e2c3c6db84684c616e4e4d77c7804555252988f96ec99dfb", 0x28}, {&(0x7f0000000380)="41230b12bebababb10b56a1e93b7883da5de9081155e464fddbf0e944e6f932811969989040c9b6a381c1166c2c156cbecc3462391ecd27becf4477affb88d9347d705a15886f1e74dd051c5ef21b23a87880391b140b7524707199781e390a557fcdda97b414d1942137a353c0b35599a1d386bf12c8ce937710414730f6f05153670a45519b4cc4a734edac1e4336f8a8db061ce566d57bd85cc5d86054adf6d78911759178df8990626311745", 0xae}, {&(0x7f0000000440)="f715368724f99c2f05fad90637033b5f018610a6b36daebb4ec3e43da748c4f8a38fb7f7231a5b3e0723c62806", 0x2d}, {&(0x7f0000000480)="efb632d964eff3ebe9fce5577b1b3ca01e61db92c2c60f624caffe9a2bf2a0b265d98c5a48d296198e5e0fd1d2ec4ba570bbbfef5ab484047d0b7bdba793bc34fa3e761c55e7f3c19d65b3dfebf28810e9d8e57fab28de1114f48b54d21e9ce46d501ebf63ee74563c45282d1ae5e39e1a5e9a18f412355ef948cc2957f5559e3285b77546e153c7b2b860e485d7760886c11db1b4fb4eb11f8141ad109ab7ca8e672210c3f391801cb0377806ed51b1f72295ed40ab47718b5292e8ec862e2fe1fd27b7c5f246fb146d4264813381108928ff5f5fddde052bb0700a09ba548b971dff3858b5", 0xe6}, {&(0x7f0000000580)="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", 0xff}, {&(0x7f0000000680)="7c40635571c4020e2cc442ed807f130275d8f8db9f53e882934d7b308a913678a278ee492c173719db1b3de24f08bca9cf69bde5d9532e85c4067621a79a76d418c7bd2966ed3776e5b5daa527dabf4af7a8f39adf82878411f783183a82e8e2ced9a1362c05bf7a16dd64fc83c5feef415a1dea0aa564f8ca129788c9dff880ce85aa06e92cf3b0a48e52d3501378fb81ed43d2fc3ef10ded167f0675412faa13e72b6e97c2691c780958b4a0f644f483186ec99672a5d0f0fdaf585c788a26f2c300bed2e6878f71522c30475f4eda1621a0c0f4ca30715cfd57951ccbf0c4cad4e9384f8752b16f2f1486f2", 0xed}, {&(0x7f0000000780)="99a9f0c6403cebe8f649c1e0ec05759075fd6c2f113e0ce5583cfb2a3e73c10efe17f72de3d8e713d11f55c30931b68b096229aad3c2e9d5c33e95edbcdd231e6429a61d2a2a3feedfcd6138f6bc4a212b02eace6f02528de4a1e57c4d580b81ded21b48c184ed70cf9ac455a5b740283dbd11d7dd0dfb2033f70f", 0x7b}, {&(0x7f0000000800)="402d608c78070d76896d603ba7a05ba58e1dccbabbdf013552de7653b30acd86b238aecaf48207d9eeb0ee1bb131ba94d21db3bccb3e49d99c7ae24a023e0a1b68bf875170a0761ab52b253685faed67324a8787335dfbb5d9c9748cdd936c84caf493598eccd6efc850d2e2568faaa8b4497d36b80425a76f745a48e43ab4f50ceba392fbefe27ca5a7851f52ff4f0a3d152d2e4524f5f4d702a48c08d4b7330c450923e67ad220053632777065edc4b7c413d99e713f96d1f6f71000db8ba0e1a691a49752616c3d05b4ea37adb10d1fd7b98b375d519dd9a75df707af4da2ac7017528d68bda2a6933a5dc1d7fbae", 0xf0}], 0xa, &(0x7f00000009c0)=[{0xc8, 0x86, 0x99, "bab6003599b02ac5908f6eaf279958a969e2a54ed5a41f449064889d1ef6a9184f5d878a9f953230ba16e5ed755ba5435aca006bf35b6f3f50d466c8c0d80c7adecac6a756abc0d15dae7265623dc0f3fd369928889ca63695cc098a3209c0eb5674a4a5723d025faea4dc0b14a673650599793e5f77f9ca9f6ddf24b6a6a222a33637c008b44217b45d8bda4f5a7be3a01fd3ce0093b24c991eb0ddd3f3f694fec12d9cf8db979bc4c70054e5644c4159ff080ae1b8605a"}, {0xb0, 0x109, 0x0, "923c6f082df34ea51ca67c64ab7a7adde6dab31ead34c971290e4288b880aa51779a3c85cff11fd8f3b5c233216e84829ea7c987fecf3688004abdbd439eb96f0b66f4d764398ad491778b44c3182adf6d72149a53cd039ce3777cc8cd0b4c6c00ce5e336f32ead615b3f33a7a6072580e9785bd9fb8cb69c3b3b0c5399c1cb3b4df5caf1f6f2a1e65904da21b88d77e34b9bcf291a5812cd62e"}, {0x1010, 0x11, 0x3f, "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"}, {0xd8, 0x11, 0x2, "e2964bea337fba2b36ff390edc44187648f803c2a5e50269a99477df5c1872396187a80c3b6d2fe2290230d6a6f6a34ad153dd580dcd18acc15accfa6c192636118b2a83a736f02ac01167e76b37e5cd827f71084ca90ffe2b1fb93183d8c096039a0c640d4e3bef5fa0c8d138e617e57d24b0245a201291e3dc3549eefc528438e294609be7bb842ef33b9f6c08117ee0f3a8dafa7d8ac5396aea8a581a37ff23c12b5557b193c40766b3fb3dd747967142fdcebb9b293d821adf5bd376548742ca7325b5"}, {0x108, 0x19f, 0xd6a6, "6e2b9e987aabe86c583ac619c4481cb6181c173527167a5ac5f394c882be1f28688460ecd512cf4ac0e65c2a4d9928a35b6f0f3b62e711924bb66b9eaea2094b0012b1e82a5da08de94ffe9ee48284e78d31da3ddccd76ec728a6c466f4d04c566ced1626097ceec68fad159bb44c25127fb8f9a9f01712b4de7abe0249e34b9e61b165a14636ccd8f369f04a7f4ed4dc3a24384129bc7501acda30961ed7f9af172ff7707b39f05e6c72bde822d814b4702714b0bfb49cdcf88c05b1c89b3f143456f8a7a5a5fba6dcdda4064e13d7ef55e05dc1a07a1eb39083e2775ccaba7e85e03b0007f64c53ab756bbf31e013e1afb54"}, {0xf8, 0x85, 0x0, "286a28d0f4caa156ee20aab135704adffc16be956803eb8b7b3c2d1534baa23c8ac0c75c64479ea596d1c27e02396e0d1313b95f4972e42bfea3817f9cbc0e080f207ff501a6d9ee218b41184047c8def39aedec3a8fb595ecb7c98050d8a8955a9ca59de95249c62c2eb9b17640be279d57bf7e2521d7d96fead9a7be7e0bc3de36fee200ca7bd3f12f7df7ca581eeee41c1a5069f1a88544d72ea2c74cdaefb66d37bb636eb33a897c554b159c5aae7d1a752f4eada9424fb71b08368ffa99f7085d3d4677157003e014eadfc3bfa41b0456d672e6924488f04d4b49b18a4c7c"}, {0x50, 0x100, 0x8, "a34b8b831ae69648ffcb8239657caab8db07e04e3e13d0fdd889f6fc4bf9016ffc514852477d66575d636f61d2b2d5cf13528b2fedd4a53581a820c0"}, {0x1010, 0x18a, 0x8, "91267a57a11ee53b0714c04cbed5974a962e98bb1ce938b2406ef5a452869ae1c0e47f18307c54842c70fb16a13a36099132689823fb0dcfb3d18ec96d8fc1b172d1cdb363ad0fb9c0f63b6f966826abfe439491f56c98bfcb142640e7216733ee7260c9115dc6895dce2b9ad3a31f01960545ad0a7e91d5437513254c33672190ab1388da5b26c4f6c2c4981961c07d4e7dd5c61c99123c2111d64df9e1229586a2fc3fb7a36257afc13989137ca5bf325f6a3adfb3217a27f5f44036fe4eeec0a4905ad4eff92f254504380b1e0c5895c0067e213e4b43d6965d34619985154149e48540c91a82c1ca19dafc438bc2d5e1d7bdce1b4080af107834c9aee333aa119bb0c1ab572bcac6732515335594044227f9bc66589d92c307de4dfdef939e433ce7629920536f2925556733af040990d94aba876b752fdea66b6180364dc8279a6b84af764afdc806486ba9198179cf3614520943e07c3ef975dea37c3a645d8c0775206a3b414ab1e34eef3088b2e47307a2ff7e52cb750e7262b296b9ee8340d4639f6b499fc3c6eccee18e04c62e9465d2a087547da739045740ff173ccda2f79ef509fd15c8d05459bdbf589368a2c7ba8a9492d4a78c91a70261c2da82c85be264f8f9a9cabd411a25b5bc257b08fe0e0e797684705ba093ba9b26cdc40eb327638e035fdfcced2ffb918d727f8f5c9ab0cdfb96acaadd9aa15f9018ac53bd4f12a431cdfb592abe152b03b1691f3a8f242d94cf1552f640fcca9d93cfc4605e3911107999a3561c60cded6b283938335b9a8f50c172779de49906616cff3a1d6c5c3b89816ad55936266bce71485b8aa73a1648563392b4a1ababa8f327d73238444bf43c8bb74a76ed1368fc19a9f1aed3abaa36ef0369e8d1f16c32fda484f784abc2c68cafad99bc28ec571b63cf716f1f1a2d8d337b8f9201d593e2f713e15a484ab916cf6d7decfe5bd15e976436b5d4113c08b776c1f0aecbf432b4248114f260ff415f35c603f7c71f30d2da743a3c6fbcef0975814645673904e25a34d36f39490975025337eaa3a38b2b4c3aa0b015352cc6ce529017306fbf47fffc077dbdd035bd5a406191ef83e63371708dcb26c13b8f280d04eba841c3f329895352dad34d5d154c545f5d994de59faa7ce8a6d7ce05efa2760f374fad79024ede5c5a6a9c6fba29a66fe83929ce565eec0c4c01b533843c6ad07d6a220a07e1d305ddbc7c48c60936afedcfede33e8bd6d70ffc1bd8b43a098c56a5e47b42110243d4cf8b563719edda81467cb72cf06cb3896832ee30e3e6855087c29f1346bb6de72175f9dd95110bd00ba8340157c1d687442ef572eab7505be8d9d3b8ce72f61fc31f56a7a749a2933efbd5b4a2d3df686e72a412cb80f27a08f3937246bed90035a9beea04860d74fb9fd682e2885016724d60b6026b74b8469a29205537b578e58a86838eab2480d3367ad1948edc244962dcbfbb023b13b8dfc9976a6a3795e30355b5ddc92a67b040d102a2ffd8c33674e118b07322246b4d75482daedbc773c4fe008030e98fc7ab4729cf4a74080447361019b9bf1c3bf778e1fa8fb908a62b7448af401b3a9ca4b22e3576a21a2fb3bc4591a7c97fb12f4c1c509b4f71b2523739822775b48fdd18d7dda153044647293bd11f4f4781809a24882cf535f43e8c25564fb5f698e34c474e5c04c41bb42a9a8841b9fff7e3db6d45a3b61312fb786b60fd204c7592ca828b791c2d0fc7893f7898b6d490e37fcc384e96a6f51d1f3dcef46d49966cc204e265d9068d69254e7d055ba156f3b2b7dd2ad30a2d42bbdda200c74616defe5fd62a49f2819d0047743d7618b3875afbe686efdb65a897a3c3b3ca5b438bba3ed2a6d9f485ed79d7fc2331636b929a06d5123921ccac7735509b17c5af979aafe8dec411f4399351919860584e0eab44314d07453ec2a17672aaa943026f69e96fc6b67b433554814d9be85dfe90ce3b82875175688dc80999f00563cd97cef79939422640b842daaf915ec56209df66b53afcbda0b50152e24107887150d6f8109578f7eb27c3c98f27cd2018a3ea2e1a533ac040647a34d1382f88ecdb2266431db2b32eebb0b274ec53c631f1d4dc84ce4eecb966fea32d531afc51480f7038ecd8ffd8e34d03245444f50c367f09c04f4dfa7c8646ba5f89d667498bf40979b3b1173822b5a595f35cb01fea96cdd2cd4a0c12d844a89117d0b514883cfdcfc5ee5d4e0abb6324b52ed24ed7fd00fcaba60f9d44d77d5d09972d0342157d8e2628ab6f2c6279a0c4535d60d8b8f0e79e56a99b7abd22fcb619348fc8e03fd30d7150a71b815d79aebe6222cc07d354a65b9a7f98eb324b7703989dd092713b5b4a87ea49a6787cbb1471b142dffca57500b5eb3fb8c20a99212670aa33afb02a430105d7c61b0ca15d437fea31d187ca9d1e235f6f7209ab616ac5cad11fa5bd6e6a73fca90bdc9ab7e0b839f87202938e6505662533daeaa0e3a349c9b27ed7d29533e2a1d0c27c9a9c7ceb6c989c2e21cc3e6509a452d94addd8597dcd66c41368aea721cffc1888cd4b24f83aad2fc6c413b18d15a2b63fd142ea6c2147eefa59d39c18bc4047ec60989454754c656be37b6e478a5792ffc43e11dbe066d5b23478c2925483b9abee20b5faf2a8613055ee2b0a057a680b693c5f388e1a3091d8479cc2315f73cfccbceac4c6c5c2e9d7f93fbe4410430901eddd0bd97a2d9ae187f870e7567cdb6f2b38d66883747c1733617ef6149480c3084bf2c8da6a87f5ef7f904a5a6bf16f341cee65fcb87081c3a74e38c6b5e560b2e9d4a0973e46e05478e1bd0ef10860fa930654a7f633d6f83b0542fce1fe8477863091ac44b9cf1d4740d4c539af02ed83af7fec7a95734b35358311ca040bec53e37c2d14250cf3012e99cb20f96380c3889721a08553cc29dcf2072ba175a86d8b3c585fe2f5afc4640201f67c71c317c7f0f096dbb3c0d23f45105b433da8a8048d61246544c7c9716bde9c870cfabd1a9b2fb3d02fbabe7cf2dd5920f47915bf73a65a796978a3d0a0f8d6182a54d22c0a5c653ca3b08b4453482f28e355f8e7938cb42038e1b4a2e3fa3f1557d8ebdd0885213c37265e75cdf1eda9deb140b5648eac20ec4496da1fba67f1e19cc03bd96731142270aca18c00749f8138155bc2726e08179c4405c7e68417082db9bd2847f3d8c5793faa2c34118aa5308d0542aff27d1d209eb482fe1152b0c75783d607acfaa50ed60a4a6ee65f20ad213360a92f7b9a4b125141256e0e84f61e246b47cb33486c637437442c8abe2e52e32d558f0af8507535b88dbe0b59aea0e08dcfe6c4e85bd4f73feca1da20ba8cc945c8c32b0f9661a202c1aaf7c0291440a1bb82f1a3a9d06dc445297a6065788b8160431c7ed7db8d790a66266c1971506ca36d1e8c1b06b8735738a85b15c1f474f956bf103fc848859a3490c178a96d34f9f7979ca6283ffa75fa035369b4cb43de3855b4f9b8b3f8879ddcca93ab335dc6bf020e174f9b5588c5d12e40d44e5609f8095bbf32de00ffcf405b6bfcdb21855c4601575a89150af08605e538933755e1d560bdea2700a80f80b5de06f589b72c09b17e9f94c8167fd45afbb9205d408ea2e9249e2065b56056943c9b8630181ab03e42994b17f70acec16dcabfbba98dac87c04e2082294d8c845235a68b248866023456b8319a8b4383e0de328cd189b6e1309ca9bc799ba4c8a46a0bb6c05d377745cbe5b4cdc5b6e4140d916eb6e08fe4a5d76938e43f8dfa24ee10ad21e597e8a7b3cd95a4acdbcfd9a5aea8cc8662ce508009b96ad3a96b72dcb2e40ad40a7fe37f0e58e0de7239697c37ce585f3c5e6517941d96fc06fe118450fbf6ae670f7376ab9151a79255df531fd9b83f287ab2e7ef942ba0f025006ddeaabb469cbae70385263028b39554539067d5a69427b6fa3e83551f485ff1c24018589219fbbf33b819ee52ed32f6946b8435d8184e4759be4f2f0860701b3793888f54b11296c62b21d955e18ea9985ef89f21324c834760329c0e12fb7b2af206ae825326c76b7a5593b3f2bd125878557da2a587a0e8d8b642ed3c0adb63b43a39cb2ec4b83ae618a3d8bc51e9d8cbb5e63bf88289960c0b23db4aac033878d939e929fc48190fae656efebb4d071c653c2cdee85edc6c5a53b0058a6fba327d8f906fbea348bff55b44f464f83b227aa736e4a1e18681cf03d89f9b4eaa1ef2514903e62fd2dcda46115d6c779d05b03f132c3eeb01efb5f77814abc72fc0c247d6cc43816a5b46ccd4fb06e7f4e1d8017a57db832f89205bc0e92b3fc2878a5f6d423a50f6f4b37e5873b114bc061f50ae4712b4722b3fb6ca1c81dd2af2314337e72f9de3ae46150136a045698d9d8098af704475c62bf119b04d8b85bae455e52389a70c5d6a222314f8340e6248e883e21010ef6b23641469d1c308e130828753242635b1ef35174837c4fcc0f5c8dbb55363d8a09c78f96df8ed6f08e3cf977a3a1bd4ae0316f19db877c2f42267e571ea4a689c38fbf2f350f1f39340eda32f123e160d06e69734e568a247040745729f5a4d053891000c99ce03f2e2d7dead296cc73a4e95babdb3a8df18d4d3e12ea8bd990bc019d40b815a874a2796d6fbd3f2b9969461d347ee5175d78c49a9a41cc48a23c51a763f6ee399d9ecac0cfa3a5b91886affcdf953a87690e0e99ccca752e5138bb08457853564b8fdcdb8bebb895f037de7481ffbd4fd04aa716bb299178c77dae70627370e241449e41c539674ca9bf753a4af05a01cec908ae90cda83e590b28a6a8205ba7527bbda017fa143c8095a75524660652f8c16089ad59b7ee584e1f79688636f57844f4979ee4c198ef979f1598716904c68a70501e3fe817c064a1228ed18e269c9a3a5ba0b3955c4bd30eceeaf05a8694910e3932ad0fb17cd50f322a10f481ddc81d035092ada4165a8114d51f67199b9d81ecf6136bf79d25d2adf67c1ec21b951bdfcdd76c1cc47702f178f598877ec875374be5ab05e13ea44675db7a883f3661cb868486584807f0a0fdb37aa0513812291addbc0dc608c439f6847fdc669e229ed82fb7a2ebf5a9c0df0cf223b15f710faf7a9bc7915fbf6fbf4e72b94bf4b803daf340373d344aee30c0e2bf0fc16c43bf8d6c6fdebf7b83dd0eec728a64cfdcd245dd077990e0bfe1b97c2c0947869221433146f07bf2591d3248b5761cf4eefca727f2d2c9ae22e37cdcdfdf504e8f8ea33c1e0baeb93a2a7139b4b30bd8d288b8b0bdee7286d2721212745b1b12787cb1c28c1e8224456bf730e8a9acb9836b85005ad0603673b5a650c0912a55c86896d037adedda27e463f657a7d896f980a7c0b6d7de84fc797de83e14320372fe727df5e0543622368814d1cb8da2a8286fd71be65fa81784cc55af088faac8f57c3956abd127f17a8a93b9ce7eb5fd0ba1aa2fb2bf54600521027159b3cc358953f9485efd92ea88e4b566d62abce0ccee962520d76ce3de9455c022008f5255a74be2738eebbee51efa705dca923be7653684e67ebc4b2917965580890e8c9747742e3034a93628451fc7abe623127dd9d9218edef08458ca7218f01d23b0189e2fff70714a00a6545f1e246d9213b8f5efd5dd70d9042a8472f88dbbba79a020e719b907192f02cdb974e008cb3a6290ee4311c5d748bb624a29aa0a2666ed236368a8efe99f09fcabd90595c1f4ad2a2fcfdf3d0372a95d78ccd22828a53968bf811b890113de0"}], 0x24c0}, 0x4000800) 10:50:46 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/68, 0x44}], 0x1}, 0x0) [ 1273.993712][ T6194] device nr0 entered promiscuous mode [ 1274.002993][ T6218] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:50:46 executing program 1: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000001ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@vsock={0x28, 0x0, 0x2710, @hyper}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000140)="d896f925165b21bbfac0eab07fef7a9ad244594391066ffd4944ec52bb9d2edcde881641f4e911e760843620cce847895c67075bc99d933371bcb55f205d329a4c838b3ed45f8cf6ac2cd2def057d7d813f3a0e243922712bae22f9830ba4094a3b9ad5a168977560637dec2fdc775e111428cd8233e", 0x76}, {&(0x7f0000000400)="5994eb7f03b714d110084d250071e54a6513d2acec0ff05bfbaae01d1a11360c14306ca0cc90afb80d609e55e4b637c746af8b545346e52448745f8ca4fc821c06e562add06ca32cf8b822dda8486639c28f7060a0888fb29f901cd29b17bd548effc689d28dfe90a276cef7484c10305fca7b440509ac93c7bd7dada1b398a5a942c08978ffcc63b021af4716d78968df0b372ca581a2b127a4b5d630e773da83e9591229b60fc3217a58a230ecfd85a0f1ee987e0a4e8db1e388cb8f46de5bc7b9dc024f1866661d1569c730a00f240e209135d8dbc0db8d2c", 0xda}, {&(0x7f0000000500)="c059abf9982bccf40d03d5e0eb78ff373653fdc46bdce783def91cac37d5bd7f2b9eadee2eccc01e32edb79e0a9dcbf17202a36bffaf74a079efa4180f4e614d097a11539327f66060d11739b2a3c5d090b258a0fac3ce6e9fbf1a7a082ce397538b96564efe8127f72e7d8b4955baf6583ea897015b3a2b3af92e1187ee57c32dee79d06483375b2eec9416054f66bdd6e31f1cf26bd380515096fcd922701d4ac5c620fa846ea9ded6fe09f1e5a24300f113e3ab8323ec9b86ae025dbef70a827db8d32080890fc81439e3d12f5080", 0xd0}, {&(0x7f0000000600)="908b02f72671e81d6a50d820f1ab186a78349757297e08f2d9dd79d8fc8128b818539a356f9d7f859f8221f024c3f739da8cdb08454eb357d5b243b38f8bbb1a96aa181b478fe0472e247d7f6e358097ea16277a155fbd8232ee2bbfcf678b22e30ffab408a78e55bffad33a5f25e3bf58ca1f0da73ac6722f56e3aeed44b6a7e332837ece3873c5b81cf636ede24b9587382a7e0f024378c7d51eb55bed5ac375184bc6f609087009636c944d7b32973c83815ff23f0b0a375eacefc8a977538da31070474c8a", 0xc7}], 0x4, &(0x7f0000001680)=[{0x1010, 0x112, 0xfffffffffffffff7, "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"}], 0x1010}, 0x40080) openat$cgroup_ro(r0, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f0000002700)={&(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @local, 0xd}, 0x80, &(0x7f0000001640)=[{&(0x7f00000003c0)='\x00', 0x1}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x14, &(0x7f0000000080), 0x2cb) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 10:50:46 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x11) close(r0) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000280)="c9", 0x1}], 0x1}, 0x240008d4) [ 1274.391107][ T6188] device nr0 entered promiscuous mode 10:50:47 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x3) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) [ 1274.684416][ T6239] device nr0 entered promiscuous mode [ 1275.043736][ T6242] IPVS: ftp: loaded support on port[0] = 21 [ 1275.198586][ T6242] chnl_net:caif_netlink_parms(): no params data found [ 1275.211782][ T2636] device bridge_slave_1 left promiscuous mode [ 1275.222127][ T2636] bridge0: port 2(bridge_slave_1) entered disabled state [ 1275.264591][ T2636] device bridge_slave_0 left promiscuous mode [ 1275.271048][ T2636] bridge0: port 1(bridge_slave_0) entered disabled state [ 1277.095602][ T2636] device hsr_slave_1 left promiscuous mode [ 1277.149628][ T2636] device hsr_slave_0 left promiscuous mode [ 1277.209549][ T2636] team0 (unregistering): Port device team_slave_1 removed [ 1277.221778][ T2636] team0 (unregistering): Port device team_slave_0 removed [ 1277.234175][ T2636] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1277.281074][ T2636] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1277.372808][ T2636] bond0 (unregistering): Released all slaves [ 1277.511304][ T6242] bridge0: port 1(bridge_slave_0) entered blocking state [ 1277.518591][ T6242] bridge0: port 1(bridge_slave_0) entered disabled state [ 1277.527146][ T6242] device bridge_slave_0 entered promiscuous mode [ 1277.535862][ T6242] bridge0: port 2(bridge_slave_1) entered blocking state [ 1277.543075][ T6242] bridge0: port 2(bridge_slave_1) entered disabled state [ 1277.551125][ T6242] device bridge_slave_1 entered promiscuous mode [ 1277.572201][ T6242] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1277.582658][ T6242] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1277.603923][ T6242] team0: Port device team_slave_0 added [ 1277.611524][ T6242] team0: Port device team_slave_1 added [ 1277.675556][ T6242] device hsr_slave_0 entered promiscuous mode [ 1277.723923][ T6242] device hsr_slave_1 entered promiscuous mode [ 1277.822020][ T6242] bridge0: port 2(bridge_slave_1) entered blocking state [ 1277.829233][ T6242] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1277.836755][ T6242] bridge0: port 1(bridge_slave_0) entered blocking state [ 1277.843921][ T6242] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1277.913219][ T6242] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1277.938560][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1277.951388][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 1277.963101][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 1277.979439][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1277.995830][ T6242] 8021q: adding VLAN 0 to HW filter on device team0 [ 1278.012099][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1278.021626][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 1278.028999][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1278.054443][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1278.063083][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 1278.070271][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1278.090377][T30413] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1278.103878][T30413] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1278.114376][T30413] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1278.131512][ T6242] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1278.143028][ T6242] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1278.157641][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1278.167359][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1278.188020][T30413] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1278.202277][ T6242] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1278.487638][ T6254] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1278.504177][ T6254] CPU: 1 PID: 6254 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1278.512141][ T6254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1278.522216][ T6254] Call Trace: [ 1278.525552][ T6254] dump_stack+0x172/0x1f0 [ 1278.529915][ T6254] dump_header+0x10f/0xb6c [ 1278.534365][ T6254] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1278.540290][ T6254] ? ___ratelimit+0x60/0x595 [ 1278.544906][ T6254] ? do_raw_spin_unlock+0x57/0x270 [ 1278.550054][ T6254] oom_kill_process.cold+0x10/0x15 [ 1278.555203][ T6254] out_of_memory+0x79a/0x1280 [ 1278.559916][ T6254] ? retint_kernel+0x2b/0x2b [ 1278.564540][ T6254] ? oom_killer_disable+0x280/0x280 [ 1278.569782][ T6254] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1278.575372][ T6254] ? memcg_event_wake+0x230/0x230 [ 1278.580531][ T6254] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1278.586379][ T6254] ? cgroup_file_notify+0x140/0x1b0 [ 1278.591623][ T6254] memory_max_write+0x22f/0x390 [ 1278.596691][ T6254] ? mem_cgroup_write+0x360/0x360 [ 1278.601838][ T6254] ? mem_cgroup_write+0x360/0x360 [ 1278.607087][ T6254] cgroup_file_write+0x241/0x790 [ 1278.612148][ T6254] ? mem_cgroup_write+0x360/0x360 [ 1278.617200][ T6254] ? kill_css+0x380/0x380 [ 1278.621569][ T6254] ? kill_css+0x380/0x380 [ 1278.625933][ T6254] kernfs_fop_write+0x2b8/0x480 [ 1278.630818][ T6254] __vfs_write+0x8a/0x110 [ 1278.635272][ T6254] ? kernfs_fop_open+0xd80/0xd80 [ 1278.640245][ T6254] vfs_write+0x20c/0x580 [ 1278.644523][ T6254] ksys_write+0x14f/0x290 [ 1278.648881][ T6254] ? __ia32_sys_read+0xb0/0xb0 [ 1278.653680][ T6254] ? do_syscall_64+0x26/0x680 [ 1278.658384][ T6254] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1278.664483][ T6254] ? do_syscall_64+0x26/0x680 [ 1278.669201][ T6254] __x64_sys_write+0x73/0xb0 [ 1278.674004][ T6254] do_syscall_64+0xfd/0x680 [ 1278.678631][ T6254] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1278.684639][ T6254] RIP: 0033:0x4592c9 [ 1278.688555][ T6254] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1278.708270][ T6254] RSP: 002b:00007ff47fd10c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1278.716702][ T6254] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 1278.724691][ T6254] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 1278.732702][ T6254] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1278.740955][ T6254] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff47fd116d4 [ 1278.748962][ T6254] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 1278.790597][ T6254] memory: usage 5368kB, limit 0kB, failcnt 458583 [ 1278.797681][ T6254] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1278.807313][ T6254] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1278.814984][ T6254] Memory cgroup stats for /syz5: cache:60KB rss:4216KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4216KB inactive_file:116KB active_file:112KB unevictable:0KB [ 1278.848673][ T6254] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=6252,uid=0 [ 1278.865572][ T6254] Memory cgroup out of memory: Killed process 6252 (syz-executor.5) total-vm:72580kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB [ 1278.884505][ T1044] oom_reaper: reaped process 6252 (syz-executor.5), now anon-rss:0kB, file-rss:34784kB, shmem-rss:0kB 10:50:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x0, 0xffffffffffffff01, 0x80000001, 0x4, 0x0, 0x10001, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 10:50:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:50:51 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x1000000002, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = openat$cgroup(r0, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000100)={0x3, 0x70, 0x9, 0x3, 0x0, 0x10001, 0x0, 0x5, 0x8, 0x5, 0xb6, 0x4, 0x7, 0x60e, 0x4, 0x100, 0x800, 0x4, 0x0, 0x1, 0xfffffffffffffff9, 0x6, 0x0, 0x7, 0x401, 0x8, 0x2, 0x6, 0x873, 0x7, 0x5, 0x0, 0x2, 0x3d, 0x7, 0x1, 0x1, 0x3, 0x0, 0x1, 0x2, @perf_config_ext={0x0, 0xfffffffffffffff8}, 0x40, 0xe73, 0x9, 0x5, 0x4, 0x3, 0x8}, r1, 0xc, r0, 0x3) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000200)=0xdaf, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000080)='cpuset.effective_cpus\x00') r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x2761, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000f0000000000000000006112580000116e427940e6cf650009004259404e337b1e1f38a68ad73cad70beca2af14f82524b15cc18210329b551265aa6406198dca6e6d0f4eb3d325bbe21abdc3e21a5db0bfe8afaa9597595db6d48e6d0"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x800000002, 0x73) sendmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x48000) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000080)=0xfffffffffffffff7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r4) 10:50:51 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/68, 0x44}], 0x1}, 0x0) 10:50:51 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair(0xf, 0x4, 0x70ae, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f0000002c40)={&(0x7f0000001640)=@ipx={0x4, 0x8, 0x6, "f60dcc1ba702", 0x63}, 0x80, &(0x7f00000029c0)=[{&(0x7f00000016c0)="922dd36ac42b3e33e01f3a3b29825ec085461f2a622781faa5d7b079e6354315aa35cb9ce4ae11718f2bd085c6cc6691485ed24355fc44509f4ec3e76536b0fc5f7d9c6ca6134f4e0ecc0fd5dd61137e3c5b7cb6d0ac9bbe4c26b5834fd20acbdcfee83d9992a9bb7c4805fcb1474d9351c949dd0d6c23588cf51cebb78382484ee920d3c3562f5a3fd00d405ad1d6200f9b9430ab2cf1f94491507e492a593439e385ff52954ddbda8a6731e135a35d88fba819a4a0851ce963e0ccff8fff625bd80fce055ea511ba4514b9ebd7636d04", 0xd1}, {&(0x7f00000017c0)="ba87efb6c23a7710c7d90029db5cdbe90e817ac93abe86f6021ea5c927e772e326f5f20e426b43deb33b02de7bfcfe6c56732bd48eabdc1f27477e41443352e98e8b5aedcebb758e9522586b7c6c7b496e003f0d5b2127db1c630d192111c48042a62536f86c2e427269e2bea522cd17dcf8557c89a4a3acbc10094f2ab916fea9626ca209cae161572a646adead881c44ccbfacba8755dacb43daa3f1f6e08299029fe2a7fb5a4fdc4b19ee2fa0f50bba321d04f04791c84e4136083c6b6914492dbbd7185065", 0xc7}, {&(0x7f00000018c0)="ae76c346a9eb8c5eabcaf2c612305fcb10367df9b530c5b97e", 0x19}, {&(0x7f0000001900)="c28bfdf7f084d588834ab88bf8ba43e3d3f074eb4c8c7833232e9d9d5578de8296a7d928423b51f5fe3f22b6000518f8b44e", 0x32}, {&(0x7f0000001940)="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", 0x1000}, {&(0x7f0000002940)="3cfad00be623434a17c1107b410dea449a1af289ecefcf5a2f78afc1e909be011b7eb298df8aeea90272b5b16a4376a60cc65f078fd02a5659934df44c4df19708badf522ea6d9b7f706fa557bf53a6ddf559c21225f1747192033badcab741c9914dcf70f66cbd085afe718ece13a80e7ca58f30d57578820c0", 0x7a}], 0x6, &(0x7f0000002a40)=[{0x68, 0x109, 0x0, "7a9ac6f1c9f496c0a9f294691e6d6b86c894aa9ac718a4c1503bc365f1418040f56639e1cd942678c045aa576f0f1e7a884b8418064cbdff9197596602b0cd5044290588332e9c7a61d0a1156598148eb0aa50"}, {0xb8, 0x110, 0x6, "f7cf4b827dd5ca99e64a255d19d5855f4d6f23c091ca6a9eed03bd5ccc8defefe5c999a72ff3a8b0b8e4660c3c31b79aa1f9ea364cccaba6240c82498e03fd6421a142ab08cbff8539501f28f4b76b9283b778def1f5b548d14deaa4725f8770186b3e6e08fd00a25b7e987e4185115e8b5d62e60039101e0274d2f37af466b1fa8f5a643ebb830db33c9c23d6c50aa48e9d16e4a920091044f405b4460ab0c909dee46bbe34292e"}, {0x18, 0xff, 0x0, "86"}, {0x18, 0x10b, 0x4963, '0'}, {0x98, 0x103, 0x756e, "6315105233c8c1a4c8edf0a97bf8dc4fef22b36125e976a4712509ca74e0232d52a6d7dbbf0a66671833105f605a6db827d8b494662317e4d669a15e1999980bf09e4c21d554e4cebc56c9d164bb414a2bfe172b174d032d747465e9681b42b80b4e0b483ae448ccbd58d05cb8a7e45915648bc2bace661ba06c030d1deb98d7153d36ea3c03"}], 0x1e8}, 0x24000004) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000280)='cgroup.type\x00'}, 0x30) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x101000, 0x0) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000080)) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={r0, &(0x7f00000000c0)="2c336a7bf9a7c4d04172a1241623c62fae9bdb565459f9d60cbce63429439d188c607c502ba27cd7d50c678fb5a6c1762487dd0272eda2165713da6e4498a35838380454e8d5aad39e2e5998613cbb5952bbbc1552824c025660702d9f8efc1211fc3b2f2447f407992519e2995b680c39eb7f1249df9ad2a19c4e2cc2dd25b1e097bb9cab6389b385f41c80f3756964a7be1094ac58bfdda0a3370e575cb27fd8f98280e0e182e6dc48bfd2aac566e810cb573823cc16bae177ff88a19fe7583527fa700fa7ecbd8c16d74a1ece98f6d2cdc850921f3d6ad7e4f06a4e5bfb7815613679d6f36d47f6cec4804e00bf12f2", &(0x7f0000000300)=""/193}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r0, &(0x7f0000000280), 0x0}, 0x18) 10:50:51 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x4) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) [ 1279.049605][ T6242] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1279.089595][ T6261] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1279.101308][ T6242] CPU: 0 PID: 6242 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1279.109239][ T6242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1279.119678][ T6242] Call Trace: [ 1279.123001][ T6242] dump_stack+0x172/0x1f0 [ 1279.127373][ T6242] dump_header+0x10f/0xb6c [ 1279.131818][ T6242] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1279.137930][ T6242] ? ___ratelimit+0x60/0x595 [ 1279.142563][ T6242] ? do_raw_spin_unlock+0x57/0x270 [ 1279.147724][ T6242] oom_kill_process.cold+0x10/0x15 [ 1279.153150][ T6242] out_of_memory+0x79a/0x1280 [ 1279.157858][ T6242] ? lock_downgrade+0x880/0x880 [ 1279.162732][ T6242] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1279.169007][ T6242] ? oom_killer_disable+0x280/0x280 [ 1279.174931][ T6242] ? find_held_lock+0x35/0x130 [ 1279.179830][ T6242] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1279.185402][ T6242] ? memcg_event_wake+0x230/0x230 [ 1279.190455][ T6242] ? do_raw_spin_unlock+0x57/0x270 [ 1279.195606][ T6242] ? _raw_spin_unlock+0x2d/0x50 [ 1279.200501][ T6242] try_charge+0x1042/0x1410 [ 1279.205045][ T6242] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1279.210617][ T6242] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1279.216898][ T6242] ? kasan_check_read+0x11/0x20 [ 1279.221789][ T6242] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1279.227803][ T6242] mem_cgroup_try_charge+0x24d/0x5e0 [ 1279.233338][ T6242] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1279.239007][ T6242] wp_page_copy+0x416/0x1770 [ 1279.243716][ T6242] ? do_wp_page+0x486/0x1500 [ 1279.248341][ T6242] ? pmd_pfn+0x1d0/0x1d0 [ 1279.252711][ T6242] ? lock_downgrade+0x880/0x880 [ 1279.257593][ T6242] ? swp_swapcount+0x540/0x540 [ 1279.262391][ T6242] ? do_raw_spin_unlock+0x57/0x270 [ 1279.267534][ T6242] ? kasan_check_read+0x11/0x20 [ 1279.272502][ T6242] ? do_raw_spin_unlock+0x57/0x270 [ 1279.283931][ T6242] do_wp_page+0x48e/0x1500 [ 1279.290335][ T6242] ? finish_mkwrite_fault+0x540/0x540 [ 1279.295852][ T6242] __handle_mm_fault+0x22e3/0x3eb0 [ 1279.301046][ T6242] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1279.306630][ T6242] ? find_held_lock+0x35/0x130 [ 1279.311430][ T6242] ? handle_mm_fault+0x292/0xa90 [ 1279.316412][ T6242] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1279.322693][ T6242] ? kasan_check_read+0x11/0x20 [ 1279.327582][ T6242] handle_mm_fault+0x3b7/0xa90 [ 1279.332388][ T6242] __do_page_fault+0x5ef/0xda0 [ 1279.337206][ T6242] do_page_fault+0x71/0x57d [ 1279.341739][ T6242] ? page_fault+0x8/0x30 [ 1279.346113][ T6242] page_fault+0x1e/0x30 [ 1279.350290][ T6242] RIP: 0033:0x4303a6 [ 1279.354372][ T6242] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 46 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 bc 4b 64 00 85 c0 0f 84 [ 1279.374081][ T6242] RSP: 002b:00007ffc895455b0 EFLAGS: 00010206 [ 1279.380173][ T6242] RAX: 0000000000019691 RBX: 0000000000714640 RCX: 0000000000008041 [ 1279.388500][ T6242] RDX: 00005555562a7930 RSI: 00005555562af970 RDI: 0000000000000003 [ 1279.396588][ T6242] RBP: 0000000000008041 R08: 0000000000000001 R09: 00005555562a6940 [ 1279.404590][ T6242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000714698 [ 1279.412758][ T6242] R13: 0000000000714698 R14: 0000000000000000 R15: 0000000000002710 [ 1279.422442][ T6242] memory: usage 984kB, limit 0kB, failcnt 458591 [ 1279.429660][ T6242] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1279.430593][ T6257] device nr0 entered promiscuous mode [ 1279.443689][ T6242] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1279.450632][ T6242] Memory cgroup stats for /syz5: cache:60KB rss:56KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:56KB inactive_file:116KB active_file:112KB unevictable:0KB 10:50:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="fb0000002e000104bfa9d345e7eb8d99c1ffffffffffffff43bc59198183fe204ee2d7080000000600000000000000801d5291d76b8c67452107132daffa33021eb82169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c33b047f720f4e89978112322628c7c1fbab650cdcafa532d3524ea85b198cb49066bf549933875e91431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a861b9390ddbad539ef278168ac8d157a656737a7ac0226d366ccec93f9f070000000000008e9234feee7baa2acd2683d489", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1279.546159][ T6242] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=6242,uid=0 [ 1279.571597][ T6242] Memory cgroup out of memory: Killed process 6242 (syz-executor.5) total-vm:72448kB, anon-rss:72kB, file-rss:34828kB, shmem-rss:0kB [ 1279.612937][ T1044] oom_reaper: reaped process 6242 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 10:50:52 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/68, 0x44}], 0x1}, 0x0) 10:50:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1279.659020][ T6269] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1279.810099][ T6278] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:50:52 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000180)={&(0x7f00000001c0)=@nl=@unspec, 0x3c, 0x0, 0x63, &(0x7f0000000140), 0x18}, 0x0) 10:50:52 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/70, 0x46}], 0x1}, 0x0) 10:50:52 executing program 2: r0 = socket$kcm(0x10, 0x1000405, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="2e00000018008109e80f80c78e000000000000fd3d84b1f768042c080cd300e8bd6efb12000900a3acf89e02000d", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) 10:50:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0x0, 0x80000001, 0x4, 0x0, 0x10001, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 10:50:52 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x9, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg(r1, 0x0, 0x8000000000) sendmsg$kcm(r1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000001b40)={&(0x7f0000001580)=@generic={0x0, "49ed980fd75d7e35cc6ffba35770c54a7ab9220ecae38cc8bee6e4f3b678dada90b0a7af9743f375c37784069d4cb5b8f7ac8c2e69ae21a9dda12217ae339eb59be78ed513367df5aea9ab240924d13372ebc77d7b61051ea8cb65c07c8cbc71fc652061c37e82d0b1ba8cb485b27cb0a09b46991c8635b36ed817b5aefe"}, 0x80, 0x0}, 0x4000000) r3 = socket$kcm(0x2, 0x3, 0x2) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x280000, 0x0) r5 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000240)={r2}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xffff, 0x80000000, 0x0, 0x0, 0x7, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x28}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r5) openat$cgroup_ro(r5, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x1, 0x0) write$cgroup_int(r6, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r7, &(0x7f0000000480)=ANY=[@ANYBLOB="d36d656d6f72790eea2062267b14684fc6f8b2332cb3ac00e69225a868b484214c9d4719a0d1903ac46546ea0fd9fb8a96438ed601fe4181ab5ce897c27c9fd44027fd66e85f243a66c350aa211d48357a03000000000000000e3f922aa00945dfd6a22626ed1c14a05acb66ef5017598c2c63f3ada14404a6ce934fcf8140815b8b0b164a42efa2050000000000005545d4f18226e5ea5590105bb33ce59cabbc6569"], 0x200600) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f0000001540)={0x2, &(0x7f0000000340)=[{0x81, 0xffffffffffffff01, 0x6, 0x7}, {0x1, 0x6, 0x1, 0xdd9}]}) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) sendmsg$kcm(r6, &(0x7f00000020c0)={&(0x7f0000001ac0)=@isdn={0x22, 0x0, 0xeff, 0xde, 0x5}, 0x80, 0x0}, 0x80) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001640)={0xffffffffffffffff, r7, 0x0, 0x0, 0x0}, 0x30) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f0000000040)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000800)={'caif0\x00', @broadcast}) 10:50:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:50:52 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/70, 0x46}], 0x1}, 0x0) [ 1280.361122][ T6303] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1280.458497][ T6307] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1280.484406][ T6306] device caif0 entered promiscuous mode 10:50:53 executing program 1: socket$kcm(0x29, 0x7, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="43bd3c6e270489ab93bec2ae38735a53d010d099ae0fc218c77723c51def56ecf989cc15c8db3e6dece41ee05d8b9d07ecd4ca17ff1978f065c396e5d9ed133a066f748bcc08dbc995c9e1e0d8e3b0d991a92771904651d03b81e618a88087cd2183b85bcb19a62172a1b1d45bfdd9dd02f4c97bbb2a354ec318776937b9a1fdcd0d5068a6866278da24ada1483e01eb000000"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001500)={&(0x7f0000000100)=@in6={0xa, 0x4e21, 0xc86, @dev={0xfe, 0x80, [], 0x25}, 0x1}, 0x80, &(0x7f0000000080)=[{&(0x7f00000013c0)="0ba22e3ff3d8a5fd78157ece72e647ef99f18de1c16586c042892f83a1babac12380c5c5e83c0279ac4e48ec7027ab4a9c7eab8c2d1fb87a9a9bc9e5aee084d5eab6d264e6e806d91102bc57b40dff209e2515ff29e8231903e30082dae61bea2e8d1d168abedcb004cc907884965dc5cefb38a0abf099", 0x77}], 0x1}, 0x800) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0, 0x1f}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000200)={r0}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x3}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 10:50:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="fb0000002e000104bfa9d345e7eb8d99c1ffffffffffffff43bc59198183fe204ee2d7080000000600000000000000801d5291d76b8c67452107132daffa33021eb82169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c33b047f720f4e89978112322628c7c1fbab650cdcafa532d3524ea85b198cb49066bf549933875e91431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a861b9390ddbad539ef278168ac8d157a656737a7ac0226d366ccec93f9f070000000000008e9234feee7baa2acd2683d489", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:50:53 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/70, 0x46}], 0x1}, 0x0) 10:50:53 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0xe) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) 10:50:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0x0, 0x80000001, 0x4, 0x0, 0x10001, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 10:50:53 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x2, 0x1, 0x7fff, 0x6}]}) r1 = socket$kcm(0x10, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000200)="230000005200815291d45a655067d7401caac5fb8da87e17f402000000000000000b04", 0x23}], 0x1}, 0x0) [ 1280.762041][ T6322] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:50:53 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/71, 0x47}], 0x1}, 0x0) 10:50:53 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x2, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0x0, 0x1f, 0x10}, 0xc) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007a80)={&(0x7f0000007800)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000007a00)=[{&(0x7f0000007880)=""/100, 0x64}, {&(0x7f0000007900)=""/193, 0xc1}], 0x2, &(0x7f0000007a40)=""/41, 0x29}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007b40)={0x1e, 0xa, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x42c0000000000000, 0x0, 0x0, 0x0, 0x1}, [@ldst={0x2, 0x1, 0x0, 0x9, 0xf, 0x8, 0xffffffffffffffff}, @exit, @exit, @ldst={0x3, 0x3, 0x7, 0x3, 0x8, 0xc, 0xfffffffffffffffc}, @map={0x18, 0xd, 0x1, 0x0, r1}, @alu={0x7, 0xffffffff00000000, 0xd, 0x8, 0x7, 0xffffffffffffffff}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xbb, &(0x7f0000000180)=""/187, 0x41f00, 0x1, [], r2, 0x1f, r0, 0x8, &(0x7f0000007ac0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000007b00)={0x5, 0x10, 0x9, 0x7fffffff}, 0x10}, 0x70) 10:50:53 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/71, 0x47}], 0x1}, 0x0) 10:50:53 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000000c0)="1b0000001d00078b5b00"/27, 0x1b}], 0x1, &(0x7f0000000000)}, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='.\x00', 0x0, 0x10}, 0x10) 10:50:53 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/71, 0x47}], 0x1}, 0x0) [ 1281.388153][ T6322] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1281.398960][ T6327] device nr0 entered promiscuous mode 10:50:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x1ff) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f00000006c0)="be4b2792b0855f87cc5f11c3c4a7291a8240ea51651d644ed6d8585218857dda4bd2e67d98d3d7761552e3d8a8a244df31c6b2d947369541452bf10ba32fde55afbccf478fe89edb53da0d9a5b4e610d8bf93dd30035b8e0249862b6b7ebef79718662c42546191ffd2b680ae8dc07970ae804e3fabf9ffed63c1f9d2e13", 0x0}, 0x18) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000780)=""/203) write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x1000000, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) recvmsg$kcm(r4, 0x0, 0xfffffffffffffffd) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000280)={0x2, &(0x7f0000000240)=[{0x5, 0x1, 0x1, 0x1}, {0x1, 0x1, 0x6, 0x802}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'syzkaller1\x00', 0x600}) [ 1281.773447][ T6359] device nr0 entered promiscuous mode [ 1282.419779][ T6365] IPVS: ftp: loaded support on port[0] = 21 10:50:54 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000340)={0x7, 0x70, 0xed, 0x9, 0xffffffff, 0x89, 0x0, 0x5, 0x40000, 0x4, 0x3, 0xec55, 0x200, 0x8, 0x8, 0x6, 0xffffffffffff8001, 0x1, 0x8, 0x4382800, 0x8001, 0x1, 0x8, 0x1, 0x80000000, 0x1, 0x1, 0x4, 0x5, 0x80, 0x5, 0x7fffffff, 0x9, 0x6, 0x6, 0x9de7, 0x4, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x10000, 0x7fffffff}, 0x354c0, 0x10000, 0xf40, 0x9, 0x8001, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xc4}, 0x3f00) gettid() close(r2) 10:50:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:50:54 executing program 0 (fault-call:3 fault-nth:0): r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:50:54 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0xab) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) [ 1282.545984][ T6372] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1282.546651][ T6373] FAULT_INJECTION: forcing a failure. [ 1282.546651][ T6373] name failslab, interval 1, probability 0, space 0, times 0 [ 1282.577858][ T6373] CPU: 1 PID: 6373 Comm: syz-executor.0 Not tainted 5.2.0-rc3+ #16 [ 1282.585794][ T6373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1282.595882][ T6373] Call Trace: [ 1282.599215][ T6373] dump_stack+0x172/0x1f0 [ 1282.603596][ T6373] should_fail.cold+0xa/0x15 [ 1282.608239][ T6373] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1282.614096][ T6373] __should_failslab+0x121/0x190 [ 1282.614116][ T6373] should_failslab+0x9/0x14 [ 1282.614129][ T6373] kmem_cache_alloc+0x47/0x6f0 [ 1282.614154][ T6373] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1282.623625][ T6373] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1282.623642][ T6373] ? refcount_inc_not_zero_checked+0x144/0x200 [ 1282.623661][ T6373] dst_alloc+0x10e/0x200 [ 1282.623683][ T6373] ip6_dst_alloc+0x34/0xa0 [ 1282.623705][ T6373] ip6_rt_cache_alloc+0xaa/0x640 [ 1282.660937][ T6373] ip6_pol_route+0x9bb/0x1050 [ 1282.665655][ T6373] ? ip6_pol_route_lookup+0xc00/0xc00 [ 1282.671068][ T6373] ? __kernel_text_address+0xd/0x40 [ 1282.676309][ T6373] ? profile_setup.cold+0xbb/0xbb [ 1282.681425][ T6373] ? arch_stack_walk+0x97/0xf0 [ 1282.686251][ T6373] ip6_pol_route_output+0x54/0x70 [ 1282.691358][ T6373] fib6_rule_lookup+0x279/0x5a0 [ 1282.696252][ T6373] ? ip6_pol_route_input+0x80/0x80 [ 1282.701401][ T6373] ? fib6_lookup+0x340/0x340 [ 1282.706030][ T6373] ? is_dynamic_key+0x1c0/0x1c0 [ 1282.711349][ T6373] ? __lockdep_free_key_range+0x120/0x120 [ 1282.717103][ T6373] ? tomoyo_check_open_permission+0x19e/0x3f0 [ 1282.723276][ T6373] ? tomoyo_file_open+0xa9/0xd0 [ 1282.728154][ T6373] ? security_file_open+0x71/0x300 [ 1282.733289][ T6373] ? do_dentry_open+0x373/0x1250 [ 1282.738264][ T6373] ? vfs_open+0xa0/0xd0 [ 1282.742467][ T6373] ? __lock_acquire+0x54f/0x5490 [ 1282.747530][ T6373] ? ima_match_policy+0x9e9/0x13b0 [ 1282.752677][ T6373] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1282.758957][ T6373] ip6_route_output_flags+0x2c4/0x350 [ 1282.764506][ T6373] ip6_dst_lookup_tail+0xd10/0x1b30 [ 1282.769741][ T6373] ? __lockdep_free_key_range+0x120/0x120 [ 1282.775627][ T6373] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1282.781912][ T6373] ? debug_smp_processor_id+0x3c/0x280 [ 1282.787626][ T6373] ? ip6_flush_pending_frames+0xd0/0xd0 [ 1282.793214][ T6373] ? __lockdep_free_key_range+0x120/0x120 [ 1282.798979][ T6373] ? rawv6_sendmsg+0x831/0x35d0 [ 1282.803907][ T6373] ? find_held_lock+0x35/0x130 [ 1282.808718][ T6373] ip6_dst_lookup_flow+0xa8/0x220 [ 1282.813780][ T6373] ? ip6_dst_lookup+0x70/0x70 [ 1282.818499][ T6373] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1282.824782][ T6373] ? kasan_check_read+0x11/0x20 [ 1282.829676][ T6373] rawv6_sendmsg+0xb33/0x35d0 [ 1282.834405][ T6373] ? rawv6_getsockopt+0x150/0x150 [ 1282.839555][ T6373] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1282.845661][ T6373] ? aa_profile_af_perm+0x320/0x320 [ 1282.850893][ T6373] ? tomoyo_check_inet_address+0xf7/0x740 [ 1282.856654][ T6373] ? tomoyo_unix_entry+0x5d0/0x5d0 [ 1282.861899][ T6373] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1282.867668][ T6373] ? rw_copy_check_uvector+0x2a6/0x330 [ 1282.873202][ T6373] ? ___might_sleep+0x163/0x280 [ 1282.878209][ T6373] ? __might_sleep+0x95/0x190 [ 1282.882950][ T6373] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1282.888712][ T6373] inet_sendmsg+0x141/0x5d0 [ 1282.893432][ T6373] ? inet_sendmsg+0x141/0x5d0 [ 1282.898279][ T6373] ? ipip_gro_receive+0x100/0x100 [ 1282.903431][ T6373] sock_sendmsg+0xd7/0x130 [ 1282.907900][ T6373] ___sys_sendmsg+0x803/0x920 [ 1282.912626][ T6373] ? copy_msghdr_from_user+0x430/0x430 [ 1282.918138][ T6373] ? kasan_check_read+0x11/0x20 [ 1282.923659][ T6373] ? __fget+0x381/0x550 [ 1282.927874][ T6373] ? __fget_light+0x1a9/0x230 [ 1282.932596][ T6373] ? __fdget+0x1b/0x20 [ 1282.936702][ T6373] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1282.942988][ T6373] __sys_sendmsg+0x105/0x1d0 [ 1282.947619][ T6373] ? __ia32_sys_shutdown+0x80/0x80 [ 1282.952788][ T6373] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1282.958678][ T6373] ? do_syscall_64+0x26/0x680 [ 1282.964002][ T6373] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1282.970117][ T6373] ? do_syscall_64+0x26/0x680 [ 1282.974842][ T6373] __x64_sys_sendmsg+0x78/0xb0 [ 1282.979646][ T6373] do_syscall_64+0xfd/0x680 [ 1282.984190][ T6373] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1282.990110][ T6373] RIP: 0033:0x4592c9 [ 1282.994030][ T6373] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1283.014007][ T6373] RSP: 002b:00007f6255c4ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1283.022489][ T6373] RAX: ffffffffffffffda RBX: 00007f6255c4ac90 RCX: 00000000004592c9 [ 1283.030499][ T6373] RDX: 0000000000000000 RSI: 00000000200014c0 RDI: 0000000000000003 [ 1283.038676][ T6373] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1283.046678][ T6373] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6255c4b6d4 [ 1283.054767][ T6373] R13: 00000000004c6f76 R14: 00000000004dc0b0 R15: 0000000000000005 [ 1283.105265][ T6375] device nr0 entered promiscuous mode [ 1283.316675][ T6365] chnl_net:caif_netlink_parms(): no params data found [ 1283.337766][ T2636] device bridge_slave_1 left promiscuous mode [ 1283.345504][ T2636] bridge0: port 2(bridge_slave_1) entered disabled state [ 1283.389539][ T2636] device bridge_slave_0 left promiscuous mode [ 1283.397522][ T2636] bridge0: port 1(bridge_slave_0) entered disabled state [ 1285.176828][ T2636] device hsr_slave_1 left promiscuous mode [ 1285.219672][ T2636] device hsr_slave_0 left promiscuous mode [ 1285.307561][ T2636] team0 (unregistering): Port device team_slave_1 removed [ 1285.321463][ T2636] team0 (unregistering): Port device team_slave_0 removed [ 1285.333284][ T2636] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1285.380802][ T2636] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1285.462343][ T2636] bond0 (unregistering): Released all slaves [ 1285.599585][ T6365] bridge0: port 1(bridge_slave_0) entered blocking state [ 1285.615391][ T6365] bridge0: port 1(bridge_slave_0) entered disabled state [ 1285.629816][ T6365] device bridge_slave_0 entered promiscuous mode [ 1285.639186][ T6365] bridge0: port 2(bridge_slave_1) entered blocking state [ 1285.648347][ T6365] bridge0: port 2(bridge_slave_1) entered disabled state [ 1285.656512][ T6365] device bridge_slave_1 entered promiscuous mode [ 1285.681523][ T6365] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1285.692503][ T6365] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1285.713262][ T6365] team0: Port device team_slave_0 added [ 1285.720908][ T6365] team0: Port device team_slave_1 added [ 1285.775470][ T6365] device hsr_slave_0 entered promiscuous mode [ 1285.814133][ T6365] device hsr_slave_1 entered promiscuous mode [ 1285.909247][ T6365] bridge0: port 2(bridge_slave_1) entered blocking state [ 1285.916443][ T6365] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1285.923919][ T6365] bridge0: port 1(bridge_slave_0) entered blocking state [ 1285.931020][ T6365] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1285.983125][ T6365] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1285.998984][ T5942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1286.009495][ T5942] bridge0: port 1(bridge_slave_0) entered disabled state [ 1286.017614][ T5942] bridge0: port 2(bridge_slave_1) entered disabled state [ 1286.026898][ T5942] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1286.050265][ T6365] 8021q: adding VLAN 0 to HW filter on device team0 [ 1286.063618][ T5942] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1286.072186][ T5942] bridge0: port 1(bridge_slave_0) entered blocking state [ 1286.079360][ T5942] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1286.106514][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1286.116275][T26106] bridge0: port 2(bridge_slave_1) entered blocking state [ 1286.123452][T26106] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1286.141234][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1286.166673][ T5942] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1286.175947][ T5942] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1286.185417][ T5942] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1286.199341][ T6365] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1286.212014][ T6365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1286.222163][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1286.262671][ T6365] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1286.553576][ T6398] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1286.570552][ T6398] CPU: 1 PID: 6398 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1286.578500][ T6398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1286.588675][ T6398] Call Trace: [ 1286.592009][ T6398] dump_stack+0x172/0x1f0 [ 1286.596374][ T6398] dump_header+0x10f/0xb6c [ 1286.600821][ T6398] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1286.606662][ T6398] ? ___ratelimit+0x60/0x595 [ 1286.611277][ T6398] ? do_raw_spin_unlock+0x57/0x270 [ 1286.616424][ T6398] oom_kill_process.cold+0x10/0x15 [ 1286.621565][ T6398] out_of_memory+0x79a/0x1280 [ 1286.626278][ T6398] ? __sched_text_start+0x8/0x8 [ 1286.631156][ T6398] ? oom_killer_disable+0x280/0x280 [ 1286.636396][ T6398] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1286.641975][ T6398] ? memcg_event_wake+0x230/0x230 [ 1286.647041][ T6398] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1286.652888][ T6398] ? cgroup_file_notify+0x140/0x1b0 [ 1286.658134][ T6398] memory_max_write+0x22f/0x390 [ 1286.663032][ T6398] ? mem_cgroup_write+0x360/0x360 [ 1286.668085][ T6398] ? lock_acquire+0x16f/0x3f0 [ 1286.672790][ T6398] ? kernfs_fop_write+0x227/0x480 [ 1286.677936][ T6398] ? kernfs_get_active+0x129/0x240 [ 1286.683079][ T6398] cgroup_file_write+0x241/0x790 [ 1286.688049][ T6398] ? mem_cgroup_write+0x360/0x360 [ 1286.693248][ T6398] ? kill_css+0x380/0x380 [ 1286.697614][ T6398] ? kill_css+0x380/0x380 [ 1286.701961][ T6398] kernfs_fop_write+0x2b8/0x480 [ 1286.706866][ T6398] __vfs_write+0x8a/0x110 [ 1286.711215][ T6398] ? kernfs_fop_open+0xd80/0xd80 [ 1286.716183][ T6398] vfs_write+0x20c/0x580 [ 1286.720498][ T6398] ksys_write+0x14f/0x290 [ 1286.724860][ T6398] ? __ia32_sys_read+0xb0/0xb0 [ 1286.729643][ T6398] ? do_syscall_64+0x26/0x680 [ 1286.734601][ T6398] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1286.740706][ T6398] ? do_syscall_64+0x26/0x680 [ 1286.745417][ T6398] __x64_sys_write+0x73/0xb0 [ 1286.750122][ T6398] do_syscall_64+0xfd/0x680 [ 1286.754657][ T6398] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1286.760588][ T6398] RIP: 0033:0x4592c9 [ 1286.764532][ T6398] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1286.784250][ T6398] RSP: 002b:00007fe0c282ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1286.792684][ T6398] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 1286.800680][ T6398] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 1286.808672][ T6398] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1286.816749][ T6398] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe0c282b6d4 [ 1286.824741][ T6398] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 1286.838890][ T6398] memory: usage 5368kB, limit 0kB, failcnt 458592 [ 1286.845856][ T6398] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1286.853916][ T6398] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1286.861516][ T6398] Memory cgroup stats for /syz5: cache:60KB rss:4208KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4208KB inactive_file:116KB active_file:112KB unevictable:0KB [ 1286.885587][ T6398] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=6397,uid=0 [ 1286.904212][ T6398] Memory cgroup out of memory: Killed process 6397 (syz-executor.5) total-vm:72580kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB [ 1286.929913][ T1044] oom_reaper: reaped process 6397 (syz-executor.5), now anon-rss:0kB, file-rss:34852kB, shmem-rss:0kB 10:50:59 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0x0, 0x80000001, 0x4, 0x0, 0x10001, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 10:50:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x1ff) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f00000006c0)="be4b2792b0855f87cc5f11c3c4a7291a8240ea51651d644ed6d8585218857dda4bd2e67d98d3d7761552e3d8a8a244df31c6b2d947369541452bf10ba32fde55afbccf478fe89edb53da0d9a5b4e610d8bf93dd30035b8e0249862b6b7ebef79718662c42546191ffd2b680ae8dc07970ae804e3fabf9ffed63c1f9d2e13", 0x0}, 0x18) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000780)=""/203) write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x1000000, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) recvmsg$kcm(r4, 0x0, 0xfffffffffffffffd) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000280)={0x2, &(0x7f0000000240)=[{0x5, 0x1, 0x1, 0x1}, {0x1, 0x1, 0x6, 0x802}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'syzkaller1\x00', 0x600}) 10:50:59 executing program 0 (fault-call:3 fault-nth:1): r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:50:59 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000080)='cpu.weight.nice\x00', 0x2, 0x0) r1 = socket$kcm(0x2, 0xa, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x2e, &(0x7f0000000000)=r1, 0x25d) recvmsg$kcm(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 10:50:59 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0xad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) 10:50:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1287.155313][ T6365] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1287.156097][ T6403] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1287.191496][ T6365] CPU: 1 PID: 6365 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1287.200459][ T6365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1287.210541][ T6365] Call Trace: [ 1287.213899][ T6365] dump_stack+0x172/0x1f0 [ 1287.218276][ T6365] dump_header+0x10f/0xb6c [ 1287.222760][ T6365] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1287.228592][ T6365] ? ___ratelimit+0x60/0x595 [ 1287.233220][ T6365] ? do_raw_spin_unlock+0x57/0x270 [ 1287.238707][ T6365] oom_kill_process.cold+0x10/0x15 [ 1287.243931][ T6365] out_of_memory+0x79a/0x1280 [ 1287.248632][ T6365] ? lock_downgrade+0x880/0x880 [ 1287.253510][ T6365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1287.259784][ T6365] ? oom_killer_disable+0x280/0x280 [ 1287.265104][ T6365] ? find_held_lock+0x35/0x130 [ 1287.269909][ T6365] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1287.275485][ T6365] ? memcg_event_wake+0x230/0x230 [ 1287.280551][ T6365] ? do_raw_spin_unlock+0x57/0x270 [ 1287.285698][ T6365] ? _raw_spin_unlock+0x2d/0x50 [ 1287.290581][ T6365] try_charge+0x1042/0x1410 [ 1287.295227][ T6365] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1287.300802][ T6365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1287.307083][ T6365] ? kasan_check_read+0x11/0x20 [ 1287.311969][ T6365] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1287.317549][ T6365] mem_cgroup_try_charge+0x24d/0x5e0 [ 1287.322863][ T6365] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1287.328529][ T6365] wp_page_copy+0x416/0x1770 [ 1287.333165][ T6365] ? do_wp_page+0x486/0x1500 [ 1287.337828][ T6365] ? pmd_pfn+0x1d0/0x1d0 [ 1287.342098][ T6365] ? lock_downgrade+0x880/0x880 [ 1287.346973][ T6365] ? swp_swapcount+0x540/0x540 [ 1287.351756][ T6365] ? do_raw_spin_unlock+0x57/0x270 [ 1287.356890][ T6365] ? kasan_check_read+0x11/0x20 [ 1287.361761][ T6365] ? do_raw_spin_unlock+0x57/0x270 [ 1287.366898][ T6365] do_wp_page+0x48e/0x1500 [ 1287.371346][ T6365] ? finish_mkwrite_fault+0x540/0x540 [ 1287.376753][ T6365] __handle_mm_fault+0x22e3/0x3eb0 [ 1287.381895][ T6365] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1287.387553][ T6365] ? find_held_lock+0x35/0x130 [ 1287.392623][ T6365] ? handle_mm_fault+0x292/0xa90 [ 1287.397690][ T6365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1287.403959][ T6365] ? kasan_check_read+0x11/0x20 [ 1287.408858][ T6365] handle_mm_fault+0x3b7/0xa90 [ 1287.413738][ T6365] __do_page_fault+0x5ef/0xda0 [ 1287.418630][ T6365] do_page_fault+0x71/0x57d [ 1287.423178][ T6365] ? page_fault+0x8/0x30 [ 1287.427568][ T6365] page_fault+0x1e/0x30 [ 1287.431778][ T6365] RIP: 0033:0x4303a6 [ 1287.435792][ T6365] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 46 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 bc 4b 64 00 85 c0 0f 84 [ 1287.455484][ T6365] RSP: 002b:00007ffcea6652f0 EFLAGS: 00010206 [ 1287.461758][ T6365] RAX: 0000000000019691 RBX: 0000000000714640 RCX: 0000000000008041 [ 1287.469758][ T6365] RDX: 0000555556666930 RSI: 000055555666e970 RDI: 0000000000000003 [ 1287.477747][ T6365] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555556665940 [ 1287.485742][ T6365] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000714698 [ 1287.494201][ T6365] R13: 0000000000714698 R14: 0000000000000000 R15: 0000000000002710 [ 1287.520623][ T6404] device nr0 entered promiscuous mode [ 1287.561414][ T6409] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:51:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1287.774237][ T6365] memory: usage 984kB, limit 0kB, failcnt 458600 [ 1287.791499][ T6365] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1287.792327][ T6405] FAULT_INJECTION: forcing a failure. [ 1287.792327][ T6405] name failslab, interval 1, probability 0, space 0, times 0 [ 1287.806682][ T6416] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1287.819894][ T6405] CPU: 1 PID: 6405 Comm: syz-executor.0 Not tainted 5.2.0-rc3+ #16 [ 1287.829454][ T6405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1287.833380][ T6365] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1287.839535][ T6405] Call Trace: [ 1287.849695][ T6405] dump_stack+0x172/0x1f0 [ 1287.854052][ T6405] should_fail.cold+0xa/0x15 [ 1287.858658][ T6405] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1287.863647][ T6365] Memory cgroup stats for /syz5: cache:60KB rss:56KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:56KB inactive_file:116KB active_file:112KB unevictable:0KB [ 1287.864487][ T6405] ? ___might_sleep+0x163/0x280 [ 1287.890197][ T6405] __should_failslab+0x121/0x190 [ 1287.895689][ T6405] should_failslab+0x9/0x14 [ 1287.900214][ T6405] kmem_cache_alloc_node+0x261/0x710 [ 1287.905536][ T6405] __alloc_skb+0xd5/0x5e0 [ 1287.909885][ T6405] ? skb_trim+0x190/0x190 [ 1287.914243][ T6405] ? __lock_acquire+0x54f/0x5490 [ 1287.919287][ T6405] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1287.920683][ T6365] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=6365,uid=0 [ 1287.926151][ T6405] ? xfrm_lookup_with_ifid+0x579/0x1fc0 [ 1287.926174][ T6405] alloc_skb_with_frags+0x93/0x580 [ 1287.926191][ T6405] ? perf_trace_lock+0xeb/0x4c0 [ 1287.926215][ T6405] sock_alloc_send_pskb+0x72d/0x8a0 [ 1287.926233][ T6405] ? ip6_dst_hoplimit+0x244/0x3f0 [ 1287.926249][ T6405] ? find_held_lock+0x35/0x130 [ 1287.926272][ T6405] ? sock_wmalloc+0x120/0x120 [ 1287.976838][ T6405] ? lock_downgrade+0x880/0x880 [ 1287.978589][ T6365] Memory cgroup out of memory: Killed process 6365 (syz-executor.5) total-vm:72448kB, anon-rss:72kB, file-rss:34828kB, shmem-rss:0kB [ 1287.981713][ T6405] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1287.981737][ T6405] ? kasan_check_read+0x11/0x20 [ 1287.981762][ T6405] sock_alloc_send_skb+0x32/0x40 [ 1288.011718][ T6405] rawv6_sendmsg+0x178e/0x35d0 [ 1288.015490][ T6410] device nr0 entered promiscuous mode [ 1288.016521][ T6405] ? rawv6_getsockopt+0x150/0x150 [ 1288.016546][ T6405] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1288.032955][ T6405] ? tomoyo_check_inet_address+0xf7/0x740 [ 1288.034919][ T1044] oom_reaper: reaped process 6365 (syz-executor.5), now anon-rss:0kB, file-rss:33932kB, shmem-rss:0kB [ 1288.038702][ T6405] ? tomoyo_unix_entry+0x5d0/0x5d0 [ 1288.054771][ T6405] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1288.060531][ T6405] ? rw_copy_check_uvector+0x2a6/0x330 [ 1288.066036][ T6405] ? ___might_sleep+0x163/0x280 [ 1288.069381][ T6416] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1288.070913][ T6405] ? __might_sleep+0x95/0x190 [ 1288.070951][ T6405] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1288.070977][ T6405] inet_sendmsg+0x141/0x5d0 [ 1288.070995][ T6405] ? inet_sendmsg+0x141/0x5d0 [ 1288.071013][ T6405] ? ipip_gro_receive+0x100/0x100 [ 1288.071039][ T6405] sock_sendmsg+0xd7/0x130 [ 1288.109299][ T6405] ___sys_sendmsg+0x803/0x920 [ 1288.114006][ T6405] ? copy_msghdr_from_user+0x430/0x430 [ 1288.119513][ T6405] ? kasan_check_read+0x11/0x20 [ 1288.124402][ T6405] ? __fget+0x381/0x550 [ 1288.128774][ T6405] ? __fget_light+0x1a9/0x230 [ 1288.133466][ T6405] ? __fdget+0x1b/0x20 [ 1288.137568][ T6405] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1288.143857][ T6405] __sys_sendmsg+0x105/0x1d0 [ 1288.148470][ T6405] ? __ia32_sys_shutdown+0x80/0x80 [ 1288.153631][ T6405] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1288.159108][ T6405] ? do_syscall_64+0x26/0x680 [ 1288.163799][ T6405] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1288.169881][ T6405] ? do_syscall_64+0x26/0x680 [ 1288.174582][ T6405] __x64_sys_sendmsg+0x78/0xb0 [ 1288.179375][ T6405] do_syscall_64+0xfd/0x680 [ 1288.183905][ T6405] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1288.189822][ T6405] RIP: 0033:0x4592c9 [ 1288.193817][ T6405] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1288.213450][ T6405] RSP: 002b:00007f6255c4ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 10:51:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1288.221986][ T6405] RAX: ffffffffffffffda RBX: 00007f6255c4ac90 RCX: 00000000004592c9 [ 1288.229977][ T6405] RDX: 0000000000000000 RSI: 00000000200014c0 RDI: 0000000000000003 [ 1288.237966][ T6405] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1288.245960][ T6405] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6255c4b6d4 [ 1288.253944][ T6405] R13: 00000000004c6f76 R14: 00000000004dc0b0 R15: 0000000000000005 10:51:00 executing program 0 (fault-call:3 fault-nth:2): r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1288.408916][ T6421] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1288.448158][ T6424] FAULT_INJECTION: forcing a failure. [ 1288.448158][ T6424] name failslab, interval 1, probability 0, space 0, times 0 [ 1288.462067][ T6424] CPU: 0 PID: 6424 Comm: syz-executor.0 Not tainted 5.2.0-rc3+ #16 [ 1288.470011][ T6424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1288.480199][ T6424] Call Trace: [ 1288.483541][ T6424] dump_stack+0x172/0x1f0 [ 1288.487927][ T6424] should_fail.cold+0xa/0x15 [ 1288.492683][ T6424] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1288.499913][ T6424] ? ___might_sleep+0x163/0x280 [ 1288.504829][ T6424] __should_failslab+0x121/0x190 [ 1288.509810][ T6424] should_failslab+0x9/0x14 [ 1288.514347][ T6424] kmem_cache_alloc_node_trace+0x26d/0x720 [ 1288.520222][ T6424] __kmalloc_node_track_caller+0x3d/0x70 [ 1288.525901][ T6424] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1288.531311][ T6424] __alloc_skb+0x10b/0x5e0 [ 1288.535761][ T6424] ? skb_trim+0x190/0x190 [ 1288.540131][ T6424] ? perf_trace_run_bpf_submit+0x131/0x190 [ 1288.545979][ T6424] ? perf_trace_run_bpf_submit+0x131/0x190 [ 1288.551922][ T6424] alloc_skb_with_frags+0x93/0x580 [ 1288.557158][ T6424] ? perf_trace_lock+0x315/0x4c0 [ 1288.562346][ T6424] sock_alloc_send_pskb+0x72d/0x8a0 [ 1288.567937][ T6424] ? ip6_dst_hoplimit+0x244/0x3f0 [ 1288.573009][ T6424] ? find_held_lock+0x35/0x130 [ 1288.577820][ T6424] ? sock_wmalloc+0x120/0x120 [ 1288.582539][ T6424] ? lock_downgrade+0x880/0x880 [ 1288.587528][ T6424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1288.593912][ T6424] ? kasan_check_read+0x11/0x20 [ 1288.598935][ T6424] sock_alloc_send_skb+0x32/0x40 [ 1288.603939][ T6424] rawv6_sendmsg+0x178e/0x35d0 [ 1288.608751][ T6424] ? rawv6_getsockopt+0x150/0x150 [ 1288.613807][ T6424] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1288.619709][ T6424] ? tomoyo_check_inet_address+0xf7/0x740 [ 1288.625540][ T6424] ? tomoyo_unix_entry+0x5d0/0x5d0 [ 1288.630693][ T6424] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1288.636764][ T6424] ? rw_copy_check_uvector+0x2a6/0x330 [ 1288.642250][ T6424] ? ___might_sleep+0x163/0x280 [ 1288.647138][ T6424] ? __might_sleep+0x95/0x190 [ 1288.651879][ T6424] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1288.657457][ T6424] inet_sendmsg+0x141/0x5d0 [ 1288.662018][ T6424] ? inet_sendmsg+0x141/0x5d0 [ 1288.666711][ T6424] ? ipip_gro_receive+0x100/0x100 [ 1288.671851][ T6424] sock_sendmsg+0xd7/0x130 [ 1288.676469][ T6424] ___sys_sendmsg+0x803/0x920 [ 1288.681174][ T6424] ? copy_msghdr_from_user+0x430/0x430 [ 1288.686690][ T6424] ? kasan_check_read+0x11/0x20 [ 1288.691681][ T6424] ? __fget+0x381/0x550 [ 1288.695871][ T6424] ? __fget_light+0x1a9/0x230 [ 1288.700598][ T6424] ? __fdget+0x1b/0x20 [ 1288.704677][ T6424] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1288.710930][ T6424] __sys_sendmsg+0x105/0x1d0 [ 1288.715562][ T6424] ? __ia32_sys_shutdown+0x80/0x80 [ 1288.720699][ T6424] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1288.726181][ T6424] ? do_syscall_64+0x26/0x680 [ 1288.730918][ T6424] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1288.737061][ T6424] ? do_syscall_64+0x26/0x680 [ 1288.741759][ T6424] __x64_sys_sendmsg+0x78/0xb0 [ 1288.746711][ T6424] do_syscall_64+0xfd/0x680 [ 1288.751527][ T6424] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1288.757426][ T6424] RIP: 0033:0x4592c9 [ 1288.761358][ T6424] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1288.781005][ T6424] RSP: 002b:00007f6255c4ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1288.789446][ T6424] RAX: ffffffffffffffda RBX: 00007f6255c4ac90 RCX: 00000000004592c9 [ 1288.797697][ T6424] RDX: 0000000000000000 RSI: 00000000200014c0 RDI: 0000000000000003 [ 1288.805687][ T6424] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1288.813720][ T6424] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6255c4b6d4 [ 1288.821742][ T6424] R13: 00000000004c6f76 R14: 00000000004dc0b0 R15: 0000000000000005 10:51:01 executing program 0 (fault-call:3 fault-nth:3): r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1288.959294][ T6429] FAULT_INJECTION: forcing a failure. [ 1288.959294][ T6429] name failslab, interval 1, probability 0, space 0, times 0 [ 1288.972323][ T6429] CPU: 1 PID: 6429 Comm: syz-executor.0 Not tainted 5.2.0-rc3+ #16 [ 1288.980232][ T6429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1288.990309][ T6429] Call Trace: [ 1288.993645][ T6429] dump_stack+0x172/0x1f0 [ 1288.998010][ T6429] should_fail.cold+0xa/0x15 [ 1289.002642][ T6429] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1289.008491][ T6429] ? lockdep_hardirqs_on+0x19e/0x5d0 [ 1289.013814][ T6429] ? trace_hardirqs_on+0x67/0x220 [ 1289.018868][ T6429] ? kasan_check_read+0x11/0x20 [ 1289.023755][ T6429] __should_failslab+0x121/0x190 [ 1289.028730][ T6429] should_failslab+0x9/0x14 [ 1289.033443][ T6429] kmem_cache_alloc+0x47/0x6f0 [ 1289.038257][ T6429] ? timer_reduce+0xde0/0xde0 [ 1289.043837][ T6429] ? lock_acquire+0x16f/0x3f0 [ 1289.048633][ T6429] skb_clone+0x154/0x3d0 [ 1289.052920][ T6429] neigh_probe+0x59/0x110 [ 1289.057296][ T6429] __neigh_event_send+0x3a4/0x16a0 [ 1289.062451][ T6429] ? neightbl_dump_info+0xc60/0xc60 [ 1289.067718][ T6429] ? __cgroup_bpf_run_filter_skb+0x677/0xd50 [ 1289.073732][ T6429] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1289.080018][ T6429] ? debug_smp_processor_id+0x3c/0x280 [ 1289.085549][ T6429] neigh_resolve_output+0x5cf/0x970 [ 1289.090780][ T6429] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1289.097071][ T6429] ? debug_smp_processor_id+0x3c/0x280 [ 1289.102593][ T6429] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1289.108880][ T6429] ip6_finish_output2+0x1034/0x2550 [ 1289.114127][ T6429] ? ip6_forward_finish+0x570/0x570 [ 1289.119443][ T6429] ? lock_downgrade+0x880/0x880 [ 1289.125453][ T6429] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1289.131730][ T6429] ? kasan_check_read+0x11/0x20 [ 1289.136708][ T6429] ip6_finish_output+0x56d/0xc20 [ 1289.141676][ T6429] ? ip6_finish_output+0x56d/0xc20 [ 1289.146834][ T6429] ip6_output+0x235/0x7f0 [ 1289.151221][ T6429] ? ip6_finish_output+0xc20/0xc20 [ 1289.156395][ T6429] ? ip6_fragment+0x3820/0x3820 [ 1289.161358][ T6429] ? kasan_check_read+0x11/0x20 [ 1289.166245][ T6429] rawv6_sendmsg+0x1edd/0x35d0 [ 1289.171055][ T6429] ? rawv6_getsockopt+0x150/0x150 [ 1289.176373][ T6429] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1289.182299][ T6429] ? tomoyo_check_inet_address+0xf7/0x740 [ 1289.188282][ T6429] ? tomoyo_unix_entry+0x5d0/0x5d0 [ 1289.193541][ T6429] ? rawv6_rcv_skb+0x390/0x390 [ 1289.198443][ T6429] ? ___might_sleep+0x163/0x280 [ 1289.200150][ T6440] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1289.203326][ T6429] ? __might_sleep+0x95/0x190 [ 1289.203400][ T6429] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1289.203423][ T6429] inet_sendmsg+0x141/0x5d0 [ 1289.203439][ T6429] ? inet_sendmsg+0x141/0x5d0 [ 1289.203456][ T6429] ? ipip_gro_receive+0x100/0x100 [ 1289.203483][ T6429] sock_sendmsg+0xd7/0x130 [ 1289.203507][ T6429] ___sys_sendmsg+0x803/0x920 [ 1289.258944][ T6429] ? copy_msghdr_from_user+0x430/0x430 [ 1289.264447][ T6429] ? kasan_check_read+0x11/0x20 [ 1289.269332][ T6429] ? __fget+0x381/0x550 [ 1289.273545][ T6429] ? __fget_light+0x1a9/0x230 [ 1289.278264][ T6429] ? __fdget+0x1b/0x20 [ 1289.282634][ T6429] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1289.288913][ T6429] __sys_sendmsg+0x105/0x1d0 [ 1289.293629][ T6429] ? __ia32_sys_shutdown+0x80/0x80 [ 1289.298873][ T6429] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1289.304384][ T6429] ? do_syscall_64+0x26/0x680 [ 1289.309099][ T6429] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1289.315191][ T6429] ? do_syscall_64+0x26/0x680 [ 1289.320087][ T6429] __x64_sys_sendmsg+0x78/0xb0 [ 1289.324886][ T6429] do_syscall_64+0xfd/0x680 [ 1289.329421][ T6429] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1289.335350][ T6429] RIP: 0033:0x4592c9 [ 1289.339294][ T6429] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1289.359361][ T6429] RSP: 002b:00007f6255c4ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1289.367804][ T6429] RAX: ffffffffffffffda RBX: 00007f6255c4ac90 RCX: 00000000004592c9 [ 1289.375890][ T6429] RDX: 0000000000000000 RSI: 00000000200014c0 RDI: 0000000000000003 [ 1289.384006][ T6429] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1289.392002][ T6429] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6255c4b6d4 [ 1289.400175][ T6429] R13: 00000000004c6f76 R14: 00000000004dc0b0 R15: 0000000000000005 10:51:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:51:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0xffffffffffffff01, 0x0, 0x4, 0x0, 0x10001, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 10:51:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x1ff) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f00000006c0)="be4b2792b0855f87cc5f11c3c4a7291a8240ea51651d644ed6d8585218857dda4bd2e67d98d3d7761552e3d8a8a244df31c6b2d947369541452bf10ba32fde55afbccf478fe89edb53da0d9a5b4e610d8bf93dd30035b8e0249862b6b7ebef79718662c42546191ffd2b680ae8dc07970ae804e3fabf9ffed63c1f9d2e13", 0x0}, 0x18) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000780)=""/203) write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x1000000, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) recvmsg$kcm(r4, 0x0, 0xfffffffffffffffd) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000280)={0x2, &(0x7f0000000240)=[{0x5, 0x1, 0x1, 0x1}, {0x1, 0x1, 0x6, 0x802}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'syzkaller1\x00', 0x600}) 10:51:02 executing program 0 (fault-call:3 fault-nth:4): r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1289.530309][ T6443] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:51:02 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) [ 1289.621041][ T6449] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:51:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0xffffffffffffff01, 0x0, 0x4, 0x0, 0x10001, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) [ 1290.064616][ T6461] device nr0 entered promiscuous mode [ 1290.110892][ T6458] device nr0 entered promiscuous mode 10:51:02 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0xad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) 10:51:02 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:51:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="fb0000002e000104bfa9d345e7eb8d99c1ffffffffffffff43bc59198183fe204ee2d7080000000600000000000000801d5291d76b8c67452107132daffa33021eb82169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c33b047f720f4e89978112322628c7c1fbab650cdcafa532d3524ea85b198cb49066bf549933875e91431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a861b9390ddbad539ef278168ac8d157a656737a7ac0226d366ccec93f9f070000000000008e9234feee7baa2acd2683d489", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1290.231072][ T6472] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:51:02 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:51:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="fb0000002e000104bfa9d345e7eb8d99c1ffffffffffffff43bc59198183fe204ee2d7080000000600000000000000801d5291d76b8c67452107132daffa33021eb82169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c33b047f720f4e89978112322628c7c1fbab650cdcafa532d3524ea85b198cb49066bf549933875e91431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a861b9390ddbad539ef278168ac8d157a656737a7ac0226d366ccec93f9f070000000000008e9234feee7baa2acd2683d489", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:51:03 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x1000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1290.629945][ T6491] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:51:03 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x2000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:51:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x1ff) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f00000006c0)="be4b2792b0855f87cc5f11c3c4a7291a8240ea51651d644ed6d8585218857dda4bd2e67d98d3d7761552e3d8a8a244df31c6b2d947369541452bf10ba32fde55afbccf478fe89edb53da0d9a5b4e610d8bf93dd30035b8e0249862b6b7ebef79718662c42546191ffd2b680ae8dc07970ae804e3fabf9ffed63c1f9d2e13", 0x0}, 0x18) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000780)=""/203) write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x1000000, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) recvmsg$kcm(r4, 0x0, 0xfffffffffffffffd) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000280)={0x2, &(0x7f0000000240)=[{0x5, 0x1, 0x1, 0x1}, {0x1, 0x1, 0x6, 0x802}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'syzkaller1\x00', 0x600}) [ 1290.773816][ T6481] device nr0 entered promiscuous mode 10:51:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="fb0000002e000104bfa9d345e7eb8d99c1ffffffffffffff43bc59198183fe204ee2d7080000000600000000000000801d5291d76b8c67452107132daffa33021eb82169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c33b047f720f4e89978112322628c7c1fbab650cdcafa532d3524ea85b198cb49066bf549933875e91431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a861b9390ddbad539ef278168ac8d157a656737a7ac0226d366ccec93f9f070000000000008e9234feee7baa2acd2683d489", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:51:03 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x3000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:51:03 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x20ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) [ 1291.382622][ T6505] device nr0 entered promiscuous mode [ 1291.480419][ T6523] device nr0 entered promiscuous mode [ 1291.484863][ T6525] IPVS: ftp: loaded support on port[0] = 21 [ 1291.983105][ T6525] chnl_net:caif_netlink_parms(): no params data found [ 1292.082627][ T6525] bridge0: port 1(bridge_slave_0) entered blocking state [ 1292.089882][ T6525] bridge0: port 1(bridge_slave_0) entered disabled state [ 1292.097683][ T6525] device bridge_slave_0 entered promiscuous mode [ 1292.109184][ T2636] device bridge_slave_1 left promiscuous mode [ 1292.115592][ T2636] bridge0: port 2(bridge_slave_1) entered disabled state [ 1292.154383][ T2636] device bridge_slave_0 left promiscuous mode [ 1292.160577][ T2636] bridge0: port 1(bridge_slave_0) entered disabled state [ 1293.925342][ T2636] device hsr_slave_1 left promiscuous mode [ 1293.977115][ T2636] device hsr_slave_0 left promiscuous mode [ 1294.037202][ T2636] team0 (unregistering): Port device team_slave_1 removed [ 1294.054056][ T2636] team0 (unregistering): Port device team_slave_0 removed [ 1294.066367][ T2636] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1294.111588][ T2636] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1294.221831][ T2636] bond0 (unregistering): Released all slaves [ 1294.316414][ T6525] bridge0: port 2(bridge_slave_1) entered blocking state [ 1294.324883][ T6525] bridge0: port 2(bridge_slave_1) entered disabled state [ 1294.332678][ T6525] device bridge_slave_1 entered promiscuous mode [ 1294.361525][ T6525] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1294.372933][ T6525] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1294.414379][ T6525] team0: Port device team_slave_0 added [ 1294.421897][ T6525] team0: Port device team_slave_1 added [ 1294.465872][ T6525] device hsr_slave_0 entered promiscuous mode [ 1294.515076][ T6525] device hsr_slave_1 entered promiscuous mode [ 1294.638400][ T6525] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1294.651845][ T5942] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1294.665197][ T5942] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1294.673118][ T5942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1294.684978][ T6525] 8021q: adding VLAN 0 to HW filter on device team0 [ 1294.697025][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1294.705992][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1294.715205][ T23] bridge0: port 1(bridge_slave_0) entered blocking state [ 1294.722284][ T23] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1294.746050][T30413] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1294.754757][T30413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1294.769928][T30413] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1294.780016][T30413] bridge0: port 2(bridge_slave_1) entered blocking state [ 1294.787175][T30413] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1294.802772][T30413] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1294.812805][T30413] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1294.840412][ T6525] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1294.852209][ T6525] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1294.866571][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1294.875443][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1294.884872][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1294.896510][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1294.915105][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1294.929711][ T6525] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1295.171991][ T6539] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1295.182943][ T6539] CPU: 1 PID: 6539 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1295.190860][ T6539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1295.201014][ T6539] Call Trace: [ 1295.204330][ T6539] dump_stack+0x172/0x1f0 [ 1295.208679][ T6539] dump_header+0x10f/0xb6c [ 1295.213106][ T6539] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1295.219105][ T6539] ? ___ratelimit+0x60/0x595 [ 1295.223725][ T6539] ? do_raw_spin_unlock+0x57/0x270 [ 1295.228940][ T6539] oom_kill_process.cold+0x10/0x15 [ 1295.234067][ T6539] out_of_memory+0x79a/0x1280 [ 1295.238760][ T6539] ? retint_kernel+0x2b/0x2b [ 1295.243367][ T6539] ? oom_killer_disable+0x280/0x280 [ 1295.248585][ T6539] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1295.254137][ T6539] ? memcg_event_wake+0x230/0x230 [ 1295.259190][ T6539] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1295.265014][ T6539] ? cgroup_file_notify+0x140/0x1b0 [ 1295.270245][ T6539] memory_max_write+0x22f/0x390 [ 1295.275131][ T6539] ? mem_cgroup_write+0x360/0x360 [ 1295.280182][ T6539] ? mem_cgroup_write+0x360/0x360 [ 1295.285222][ T6539] ? cgroup_file_write+0x1e2/0x790 [ 1295.290350][ T6539] cgroup_file_write+0x241/0x790 [ 1295.295302][ T6539] ? mem_cgroup_write+0x360/0x360 [ 1295.300332][ T6539] ? kill_css+0x380/0x380 [ 1295.304764][ T6539] ? kill_css+0x380/0x380 [ 1295.309114][ T6539] kernfs_fop_write+0x2b8/0x480 [ 1295.313984][ T6539] __vfs_write+0x8a/0x110 [ 1295.318322][ T6539] ? kernfs_fop_open+0xd80/0xd80 [ 1295.323266][ T6539] vfs_write+0x20c/0x580 [ 1295.327521][ T6539] ksys_write+0x14f/0x290 [ 1295.331858][ T6539] ? __ia32_sys_read+0xb0/0xb0 [ 1295.336658][ T6539] ? do_syscall_64+0x26/0x680 [ 1295.341361][ T6539] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1295.347444][ T6539] ? do_syscall_64+0x26/0x680 [ 1295.352152][ T6539] __x64_sys_write+0x73/0xb0 [ 1295.356764][ T6539] do_syscall_64+0xfd/0x680 [ 1295.361280][ T6539] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1295.367176][ T6539] RIP: 0033:0x4592c9 [ 1295.371079][ T6539] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1295.390779][ T6539] RSP: 002b:00007f233e1cdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1295.399208][ T6539] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 1295.407204][ T6539] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 1295.415188][ T6539] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1295.423168][ T6539] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f233e1ce6d4 [ 1295.431142][ T6539] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 1295.479002][ T6539] memory: usage 5332kB, limit 0kB, failcnt 458601 [ 1295.487110][ T6539] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1295.498523][ T6539] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1295.513878][ T6539] Memory cgroup stats for /syz5: cache:60KB rss:4252KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4252KB inactive_file:116KB active_file:112KB unevictable:0KB [ 1295.537506][ T6539] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=6538,uid=0 [ 1295.554916][ T6539] Memory cgroup out of memory: Killed process 6538 (syz-executor.5) total-vm:72580kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB [ 1295.574877][ T1044] oom_reaper: reaped process 6538 (syz-executor.5), now anon-rss:0kB, file-rss:34852kB, shmem-rss:0kB 10:51:08 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0xffffffffffffff01, 0x0, 0x4, 0x0, 0x10001, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 10:51:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:51:08 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0xad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) 10:51:08 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x4000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:51:08 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x80000000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000004, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0xa2, 0x6, 0x4, 0x8, 0x0, 0x8000, 0x2, 0x2, 0x8, 0x100, 0x80000000, 0x10000, 0x0, 0x101, 0x8, 0x6, 0x2, 0xf658, 0x2ca, 0x100000000, 0x101, 0x9, 0x1f, 0x5, 0x302, 0x6, 0x4, 0x60d4, 0x7f, 0x4, 0x4004, 0x1000, 0x2, 0x5, 0x9, 0x5, 0x0, 0x3f, 0x2, @perf_config_ext={0x8, 0x2}, 0x20402, 0x1, 0x5, 0x2, 0x2, 0x8, 0x18}, 0x0, 0x10, r0, 0x8) perf_event_open(&(0x7f00000000c0)={0x8, 0x70, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9}, 0xffffffffffffffff, 0x0, r1, 0x0) 10:51:08 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x30ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) [ 1295.720588][ T6525] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1295.765907][ T6546] __nla_validate_parse: 2 callbacks suppressed [ 1295.766366][ T6546] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1295.784834][ T6525] CPU: 0 PID: 6525 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1295.792760][ T6525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1295.802827][ T6525] Call Trace: [ 1295.806134][ T6525] dump_stack+0x172/0x1f0 [ 1295.810478][ T6525] dump_header+0x10f/0xb6c [ 1295.814913][ T6525] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1295.820746][ T6525] ? ___ratelimit+0x60/0x595 [ 1295.825348][ T6525] ? do_raw_spin_unlock+0x57/0x270 [ 1295.830579][ T6525] oom_kill_process.cold+0x10/0x15 [ 1295.835728][ T6525] out_of_memory+0x79a/0x1280 [ 1295.840423][ T6525] ? lock_downgrade+0x880/0x880 [ 1295.845282][ T6525] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1295.851557][ T6525] ? oom_killer_disable+0x280/0x280 [ 1295.856756][ T6525] ? find_held_lock+0x35/0x130 [ 1295.861539][ T6525] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1295.867103][ T6525] ? memcg_event_wake+0x230/0x230 [ 1295.872151][ T6525] ? do_raw_spin_unlock+0x57/0x270 [ 1295.877268][ T6525] ? _raw_spin_unlock+0x2d/0x50 [ 1295.882132][ T6525] try_charge+0x1042/0x1410 [ 1295.886650][ T6525] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1295.892205][ T6525] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1295.898473][ T6525] ? kasan_check_read+0x11/0x20 [ 1295.903344][ T6525] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1295.908947][ T6525] mem_cgroup_try_charge+0x24d/0x5e0 [ 1295.914263][ T6525] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1295.919908][ T6525] wp_page_copy+0x416/0x1770 [ 1295.924530][ T6525] ? do_wp_page+0x486/0x1500 [ 1295.929144][ T6525] ? pmd_pfn+0x1d0/0x1d0 [ 1295.933401][ T6525] ? lock_downgrade+0x880/0x880 [ 1295.938263][ T6525] ? swp_swapcount+0x540/0x540 [ 1295.943033][ T6525] ? do_raw_spin_unlock+0x57/0x270 [ 1295.948436][ T6525] ? kasan_check_read+0x11/0x20 [ 1295.953300][ T6525] ? do_raw_spin_unlock+0x57/0x270 [ 1295.958430][ T6525] do_wp_page+0x48e/0x1500 [ 1295.962906][ T6525] ? finish_mkwrite_fault+0x540/0x540 [ 1295.968310][ T6525] __handle_mm_fault+0x22e3/0x3eb0 [ 1295.973440][ T6525] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1295.979004][ T6525] ? find_held_lock+0x35/0x130 [ 1295.983779][ T6525] ? handle_mm_fault+0x292/0xa90 [ 1295.988735][ T6525] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1295.994992][ T6525] ? kasan_check_read+0x11/0x20 [ 1295.999863][ T6525] handle_mm_fault+0x3b7/0xa90 [ 1296.004660][ T6525] __do_page_fault+0x5ef/0xda0 [ 1296.009474][ T6525] do_page_fault+0x71/0x57d [ 1296.014009][ T6525] ? page_fault+0x8/0x30 [ 1296.018278][ T6525] page_fault+0x1e/0x30 [ 1296.022618][ T6525] RIP: 0033:0x4303a6 [ 1296.026536][ T6525] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 46 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 bc 4b 64 00 85 c0 0f 84 [ 1296.046147][ T6525] RSP: 002b:00007fff5724d660 EFLAGS: 00010206 [ 1296.052219][ T6525] RAX: 0000000000019691 RBX: 0000000000714640 RCX: 0000000000008041 [ 1296.060195][ T6525] RDX: 00005555559fd930 RSI: 0000555555a05970 RDI: 0000000000000003 [ 1296.068174][ T6525] RBP: 0000000000008041 R08: 0000000000000001 R09: 00005555559fc940 [ 1296.076152][ T6525] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000714698 [ 1296.084135][ T6525] R13: 0000000000714698 R14: 0000000000000000 R15: 0000000000002710 [ 1296.108064][ T6548] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1296.124430][ T6547] device nr0 entered promiscuous mode [ 1296.154125][ T6525] memory: usage 940kB, limit 0kB, failcnt 458609 [ 1296.160531][ T6525] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1296.179950][ T6525] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 10:51:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="fb0000002e000104bfa9d345e7eb8d99c1ffffffffffffff43bc59198183fe204ee2d7080000000600000000000000801d5291d76b8c67452107132daffa33021eb82169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c33b047f720f4e89978112322628c7c1fbab650cdcafa532d3524ea85b198cb49066bf549933875e91431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a861b9390ddbad539ef278168ac8d157a656737a7ac0226d366ccec93f9f070000000000008e9234feee7baa2acd2683d489", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1296.192847][ T6525] Memory cgroup stats for /syz5: cache:60KB rss:56KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:56KB inactive_file:116KB active_file:112KB unevictable:0KB [ 1296.247359][ T6525] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=6525,uid=0 [ 1296.285371][ T6553] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1296.303469][ T6525] Memory cgroup out of memory: Killed process 6525 (syz-executor.5) total-vm:72448kB, anon-rss:68kB, file-rss:34828kB, shmem-rss:0kB [ 1296.313714][ T6554] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1296.329715][ T1044] oom_reaper: reaped process 6525 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 10:51:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="fb0000002e000104bfa9d345e7eb8d99c1ffffffffffffff43bc59198183fe204ee2d7080000000600000000000000801d5291d76b8c67452107132daffa33021eb82169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c33b047f720f4e89978112322628c7c1fbab650cdcafa532d3524ea85b198cb49066bf549933875e91431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a861b9390ddbad539ef278168ac8d157a656737a7ac0226d366ccec93f9f070000000000008e9234feee7baa2acd2683d489", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1296.387694][ T6555] device nr0 entered promiscuous mode 10:51:08 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x5000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1296.447802][ T6559] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:51:09 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0xffffffffffffff01, 0x0, 0x4, 0x0, 0x10001, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 10:51:09 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x6000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1296.820146][ T6567] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1296.840320][ T6567] CPU: 0 PID: 6567 Comm: syz-executor.2 Not tainted 5.2.0-rc3+ #16 [ 1296.848252][ T6567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1296.858327][ T6567] Call Trace: [ 1296.861642][ T6567] dump_stack+0x172/0x1f0 [ 1296.866035][ T6567] dump_header+0x10f/0xb6c [ 1296.870473][ T6567] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1296.876301][ T6567] ? ___ratelimit+0x60/0x595 [ 1296.880907][ T6567] ? do_raw_spin_unlock+0x57/0x270 [ 1296.886042][ T6567] oom_kill_process.cold+0x10/0x15 [ 1296.891180][ T6567] out_of_memory+0x79a/0x1280 [ 1296.895881][ T6567] ? retint_kernel+0x2b/0x2b [ 1296.900496][ T6567] ? oom_killer_disable+0x280/0x280 [ 1296.905731][ T6567] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1296.911328][ T6567] ? memcg_event_wake+0x230/0x230 [ 1296.916380][ T6567] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1296.922210][ T6567] ? cgroup_file_notify+0x140/0x1b0 [ 1296.927431][ T6567] memory_max_write+0x22f/0x390 [ 1296.932301][ T6567] ? retint_kernel+0x2b/0x2b [ 1296.936917][ T6567] ? mem_cgroup_write+0x360/0x360 [ 1296.941967][ T6567] ? mem_cgroup_write+0x360/0x360 [ 1296.947016][ T6567] ? cgroup_file_write+0x220/0x790 [ 1296.952137][ T6567] cgroup_file_write+0x241/0x790 [ 1296.957137][ T6567] ? mem_cgroup_write+0x360/0x360 [ 1296.962192][ T6567] ? kill_css+0x380/0x380 [ 1296.966527][ T6567] ? kill_css+0x380/0x380 [ 1296.970849][ T6567] kernfs_fop_write+0x2b8/0x480 [ 1296.975699][ T6567] __vfs_write+0x8a/0x110 [ 1296.980075][ T6567] ? kernfs_fop_open+0xd80/0xd80 [ 1296.985021][ T6567] vfs_write+0x20c/0x580 [ 1296.989276][ T6567] ksys_write+0x14f/0x290 [ 1296.993598][ T6567] ? __ia32_sys_read+0xb0/0xb0 [ 1296.998376][ T6567] ? do_syscall_64+0x26/0x680 [ 1297.003050][ T6567] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1297.009129][ T6567] ? do_syscall_64+0x26/0x680 [ 1297.013843][ T6567] __x64_sys_write+0x73/0xb0 [ 1297.018471][ T6567] do_syscall_64+0xfd/0x680 [ 1297.023006][ T6567] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1297.028908][ T6567] RIP: 0033:0x4592c9 [ 1297.032799][ T6567] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1297.052638][ T6567] RSP: 002b:00007f4aaecd1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1297.061096][ T6567] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 1297.069070][ T6567] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 1297.077050][ T6567] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1297.085070][ T6567] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4aaecd26d4 [ 1297.093080][ T6567] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 1297.108119][ T6567] memory: usage 14192kB, limit 0kB, failcnt 452194 [ 1297.117353][ T6567] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1297.125290][ T6572] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1297.134069][ T6567] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1297.142094][ T6567] Memory cgroup stats for /syz2: cache:6224KB rss:4348KB rss_huge:4096KB shmem:5960KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:5940KB active_anon:4276KB inactive_file:88KB active_file:8KB unevictable:0KB 10:51:09 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x7000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1297.168177][ T6567] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=6565,uid=0 [ 1297.185141][ T6567] Memory cgroup out of memory: Killed process 6565 (syz-executor.2) total-vm:72576kB, anon-rss:4236kB, file-rss:35784kB, shmem-rss:0kB [ 1297.202901][ T1044] oom_reaper: reaped process 6565 (syz-executor.2), now anon-rss:0kB, file-rss:34912kB, shmem-rss:0kB 10:51:09 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0xffffffffffffff01, 0x80000001, 0x0, 0x0, 0x10001, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 10:51:09 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x8000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1297.535484][ T6550] device nr0 entered promiscuous mode 10:51:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:51:10 executing program 1: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x2, &(0x7f0000000040)=@raw=[@exit, @alu={0x4, 0x6, 0x3, 0x4, 0xb, 0x1a, 0x10}], &(0x7f0000000080)='syzkaller\x00', 0x101, 0x2e, &(0x7f0000000100)=""/46, 0x41100, 0x1, [], 0x0, 0xc, r1, 0x8, &(0x7f0000000140)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000180)={0x2, 0xc, 0xddf, 0x2}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x0, 0x18, 0xfffffffffffffd11, &(0x7f00000000c0), 0x0}, 0xfffffe1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000000)='e\xd8\x1a') 10:51:10 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.events\x00', 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000000)='s\xcf\"@\xe4', 0x200002, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x40000103) 10:51:10 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x40ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) 10:51:10 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0xffffffffffffff01, 0x80000001, 0x0, 0x0, 0x10001, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 10:51:10 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x9000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1297.842784][ T6586] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1297.877831][ T6588] device nr0 entered promiscuous mode 10:51:10 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0xa000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:51:10 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0xb000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:51:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1298.579056][ T6602] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:51:11 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0xc000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1298.749589][ T6605] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:51:11 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0xd000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:51:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1299.096810][ T6620] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:51:11 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x50ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) [ 1299.490608][ T6632] device nr0 entered promiscuous mode 10:51:12 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000c80)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2\x89\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xdd\xff\x7f\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdfC\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-b\xca\xed\xf1i\x1a\\\xf4\x0fn\x0f\xe6JGd\xd1\xac\xf8\x8c\xc3DL4\xe3.\x89b\xcf7\xe6\f\xfek\xe9\x01\xdc\xce\x81&EU\x9cO\xde|s\bHsK\xca\v|\xd9\xbd\xe7\xbf\xd0\xccC\xa0;\x8c\x86{\xf2\xac\x97h\xfe$\xa6c\xea\x02\x11\x1e\xcf\x82\x87\x9b\b0\xaa\xb7\x9a\xe0v\xe1\xda\x92\xe1A\x80,/$\x8e\x93\xb4\xa6\xd9\x00\"\x93G\xc8\xd3\xb7\x9b\x0fqA\x0f%\xcb\"\xb8\x1e\xee\x1d\x9c\x87X\xfd5\xce\"\x83\xc6au\\#\xde\x11Wt\x80\x80\xe8\xde*\xa3\xc8\xb7\xb7\xe0\x0f\x1f:\xaa\xc2\xfd', 0x2761, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ys\xda<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xff\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-\x00\x00\x00\x00\x9b\x82\x11j<\x17Y\x1d0vjX\v\xab5p\x92\x16\xab\x97\xa7S\xd6\\y\xd5\xa4\xbbW\xaa}\xcf\xa0\xed\x1d\xa4\xa4\rG', 0x2761, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) openat$cgroup_subtree(r1, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000200)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r1, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) [ 1300.078886][ T6644] IPVS: ftp: loaded support on port[0] = 21 [ 1300.449050][ T6630] device nr0 entered promiscuous mode [ 1300.523019][ T2636] device bridge_slave_1 left promiscuous mode [ 1300.532678][ T2636] bridge0: port 2(bridge_slave_1) entered disabled state [ 1300.597207][ T2636] device bridge_slave_0 left promiscuous mode [ 1300.611707][ T2636] bridge0: port 1(bridge_slave_0) entered disabled state [ 1304.696685][ T2636] device hsr_slave_1 left promiscuous mode [ 1304.739860][ T2636] device hsr_slave_0 left promiscuous mode [ 1304.798893][ T2636] team0 (unregistering): Port device team_slave_1 removed [ 1304.821386][ T2636] team0 (unregistering): Port device team_slave_0 removed [ 1304.838578][ T2636] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1304.895666][ T2636] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1305.049057][ T2636] bond0 (unregistering): Released all slaves [ 1305.209664][ T6644] chnl_net:caif_netlink_parms(): no params data found [ 1305.334570][ T6644] bridge0: port 1(bridge_slave_0) entered blocking state [ 1305.341675][ T6644] bridge0: port 1(bridge_slave_0) entered disabled state [ 1305.356560][ T6644] device bridge_slave_0 entered promiscuous mode [ 1305.365504][ T6644] bridge0: port 2(bridge_slave_1) entered blocking state [ 1305.372647][ T6644] bridge0: port 2(bridge_slave_1) entered disabled state [ 1305.395829][ T6644] device bridge_slave_1 entered promiscuous mode [ 1305.439529][ T6644] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1305.467670][ T6644] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1305.492324][ T6644] team0: Port device team_slave_0 added [ 1305.501338][ T6644] team0: Port device team_slave_1 added [ 1305.576498][ T6644] device hsr_slave_0 entered promiscuous mode [ 1305.613766][ T6644] device hsr_slave_1 entered promiscuous mode [ 1305.675126][ T6644] bridge0: port 2(bridge_slave_1) entered blocking state [ 1305.682259][ T6644] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1305.690125][ T6644] bridge0: port 1(bridge_slave_0) entered blocking state [ 1305.697363][ T6644] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1305.817999][ T6644] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1305.841868][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1305.865434][T26106] bridge0: port 1(bridge_slave_0) entered disabled state [ 1305.883611][T26106] bridge0: port 2(bridge_slave_1) entered disabled state [ 1305.895578][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1305.923633][ T6644] 8021q: adding VLAN 0 to HW filter on device team0 [ 1305.949610][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1305.963917][T26106] bridge0: port 1(bridge_slave_0) entered blocking state [ 1305.971030][T26106] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1306.016064][ T5942] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1306.025627][ T5942] bridge0: port 2(bridge_slave_1) entered blocking state [ 1306.032712][ T5942] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1306.074492][ T5942] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1306.084058][ T5942] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1306.101516][ T6644] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1306.113057][ T6644] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1306.127992][T15778] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1306.136969][T15778] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1306.146758][T15778] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1306.182678][ T5942] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1306.207113][ T6644] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1306.509657][ T6656] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1306.529289][ T6656] CPU: 0 PID: 6656 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1306.537515][ T6656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1306.547597][ T6656] Call Trace: [ 1306.550949][ T6656] dump_stack+0x172/0x1f0 [ 1306.555331][ T6656] dump_header+0x10f/0xb6c [ 1306.559824][ T6656] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1306.565661][ T6656] ? ___ratelimit+0x60/0x595 [ 1306.570656][ T6656] ? do_raw_spin_unlock+0x57/0x270 [ 1306.575813][ T6656] oom_kill_process.cold+0x10/0x15 [ 1306.580987][ T6656] out_of_memory+0x79a/0x1280 [ 1306.587618][ T6656] ? retint_kernel+0x2b/0x2b [ 1306.592532][ T6656] ? oom_killer_disable+0x280/0x280 [ 1306.597811][ T6656] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1306.603397][ T6656] ? memcg_event_wake+0x230/0x230 [ 1306.608466][ T6656] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1306.614311][ T6656] ? cgroup_file_notify+0x140/0x1b0 [ 1306.619561][ T6656] memory_max_write+0x22f/0x390 [ 1306.624548][ T6656] ? mem_cgroup_write+0x360/0x360 [ 1306.629604][ T6656] ? mem_cgroup_write+0x360/0x360 [ 1306.634663][ T6656] cgroup_file_write+0x241/0x790 [ 1306.639634][ T6656] ? mem_cgroup_write+0x360/0x360 [ 1306.644679][ T6656] ? kill_css+0x380/0x380 [ 1306.649036][ T6656] ? kill_css+0x380/0x380 [ 1306.654009][ T6656] kernfs_fop_write+0x2b8/0x480 [ 1306.658888][ T6656] __vfs_write+0x8a/0x110 [ 1306.663328][ T6656] ? kernfs_fop_open+0xd80/0xd80 [ 1306.668286][ T6656] vfs_write+0x20c/0x580 [ 1306.672561][ T6656] ksys_write+0x14f/0x290 [ 1306.676929][ T6656] ? __ia32_sys_read+0xb0/0xb0 [ 1306.681802][ T6656] ? do_syscall_64+0x26/0x680 [ 1306.686512][ T6656] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1306.692600][ T6656] ? do_syscall_64+0x26/0x680 [ 1306.697577][ T6656] __x64_sys_write+0x73/0xb0 [ 1306.702201][ T6656] do_syscall_64+0xfd/0x680 [ 1306.706733][ T6656] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1306.712648][ T6656] RIP: 0033:0x4592c9 [ 1306.716559][ T6656] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1306.736199][ T6656] RSP: 002b:00007f639ee65c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1306.744727][ T6656] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 1306.752750][ T6656] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 1306.760744][ T6656] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1306.768839][ T6656] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f639ee666d4 [ 1306.776844][ T6656] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 1306.809496][ T6656] memory: usage 5316kB, limit 0kB, failcnt 458610 [ 1306.817451][ T6656] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1306.833023][ T6656] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1306.844258][ T6656] Memory cgroup stats for /syz5: cache:60KB rss:4164KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4164KB inactive_file:116KB active_file:112KB unevictable:0KB [ 1306.868309][ T6656] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=6655,uid=0 [ 1306.885235][ T6656] Memory cgroup out of memory: Killed process 6655 (syz-executor.5) total-vm:72580kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB [ 1306.904997][ T1044] oom_reaper: reaped process 6655 (syz-executor.5), now anon-rss:0kB, file-rss:34788kB, shmem-rss:0kB [ 1307.246191][ T6644] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1307.265568][ T6644] CPU: 0 PID: 6644 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1307.273619][ T6644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1307.283689][ T6644] Call Trace: [ 1307.287121][ T6644] dump_stack+0x172/0x1f0 [ 1307.291834][ T6644] dump_header+0x10f/0xb6c [ 1307.296911][ T6644] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1307.304399][ T6644] ? ___ratelimit+0x60/0x595 [ 1307.309013][ T6644] ? do_raw_spin_unlock+0x57/0x270 [ 1307.314278][ T6644] oom_kill_process.cold+0x10/0x15 [ 1307.319428][ T6644] out_of_memory+0x79a/0x1280 [ 1307.324108][ T6644] ? lock_downgrade+0x880/0x880 [ 1307.328958][ T6644] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1307.335383][ T6644] ? oom_killer_disable+0x280/0x280 [ 1307.340691][ T6644] ? find_held_lock+0x35/0x130 [ 1307.345611][ T6644] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1307.351358][ T6644] ? memcg_event_wake+0x230/0x230 [ 1307.357175][ T6644] ? do_raw_spin_unlock+0x57/0x270 [ 1307.362906][ T6644] ? _raw_spin_unlock+0x2d/0x50 [ 1307.368151][ T6644] try_charge+0x1042/0x1410 [ 1307.372754][ T6644] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1307.378309][ T6644] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1307.384673][ T6644] ? kasan_check_read+0x11/0x20 [ 1307.389525][ T6644] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1307.395160][ T6644] mem_cgroup_try_charge+0x24d/0x5e0 [ 1307.400448][ T6644] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1307.406199][ T6644] wp_page_copy+0x416/0x1770 [ 1307.411176][ T6644] ? do_wp_page+0x486/0x1500 [ 1307.417599][ T6644] ? pmd_pfn+0x1d0/0x1d0 [ 1307.422383][ T6644] ? lock_downgrade+0x880/0x880 [ 1307.427407][ T6644] ? swp_swapcount+0x540/0x540 [ 1307.432937][ T6644] ? do_raw_spin_unlock+0x57/0x270 [ 1307.443519][ T6644] ? kasan_check_read+0x11/0x20 [ 1307.448592][ T6644] ? do_raw_spin_unlock+0x57/0x270 [ 1307.453711][ T6644] do_wp_page+0x48e/0x1500 [ 1307.465836][ T6644] ? finish_mkwrite_fault+0x540/0x540 [ 1307.471306][ T6644] __handle_mm_fault+0x22e3/0x3eb0 [ 1307.476448][ T6644] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1307.482026][ T6644] ? find_held_lock+0x35/0x130 [ 1307.486814][ T6644] ? handle_mm_fault+0x292/0xa90 [ 1307.491874][ T6644] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1307.498852][ T6644] ? kasan_check_read+0x11/0x20 [ 1307.503709][ T6644] handle_mm_fault+0x3b7/0xa90 [ 1307.508472][ T6644] __do_page_fault+0x5ef/0xda0 [ 1307.515689][ T6644] do_page_fault+0x71/0x57d [ 1307.520391][ T6644] ? page_fault+0x8/0x30 [ 1307.525018][ T6644] page_fault+0x1e/0x30 [ 1307.529168][ T6644] RIP: 0033:0x4303a6 [ 1307.533518][ T6644] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 46 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 bc 4b 64 00 85 c0 0f 84 [ 1307.553134][ T6644] RSP: 002b:00007ffc3b983050 EFLAGS: 00010206 [ 1307.559209][ T6644] RAX: 0000000000019691 RBX: 0000000000714640 RCX: 0000000000008041 [ 1307.567263][ T6644] RDX: 0000555556921930 RSI: 0000555556929970 RDI: 0000000000000003 [ 1307.575516][ T6644] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555556920940 [ 1307.583571][ T6644] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000714698 [ 1307.591900][ T6644] R13: 0000000000714698 R14: 0000000000000000 R15: 0000000000002710 [ 1307.608956][ T6644] memory: usage 928kB, limit 0kB, failcnt 458618 [ 1307.616550][ T6644] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1307.629817][ T6644] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1307.638001][ T6644] Memory cgroup stats for /syz5: cache:60KB rss:4KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4KB inactive_file:116KB active_file:112KB unevictable:0KB [ 1307.665707][ T6644] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=6644,uid=0 [ 1307.687849][ T6644] Memory cgroup out of memory: Killed process 6644 (syz-executor.5) total-vm:72448kB, anon-rss:68kB, file-rss:34828kB, shmem-rss:0kB [ 1307.706459][ T1044] oom_reaper: reaped process 6644 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 1310.044433][ T2636] device bridge_slave_1 left promiscuous mode [ 1310.050708][ T2636] bridge0: port 2(bridge_slave_1) entered disabled state [ 1310.104592][ T2636] device bridge_slave_0 left promiscuous mode [ 1310.110846][ T2636] bridge0: port 1(bridge_slave_0) entered disabled state [ 1313.986357][ T2636] device hsr_slave_1 left promiscuous mode [ 1314.029355][ T2636] device hsr_slave_0 left promiscuous mode [ 1314.089086][ T2636] team0 (unregistering): Port device team_slave_1 removed [ 1314.111282][ T2636] team0 (unregistering): Port device team_slave_0 removed [ 1314.139591][ T2636] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1314.193181][ T2636] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1314.351715][ T2636] bond0 (unregistering): Released all slaves 10:52:10 executing program 2: 10:52:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:52:10 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0xe000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:52:10 executing program 1: r0 = perf_event_open(&(0x7f00000000c0)={0x7, 0x70, 0x1ff, 0x21e3, 0x8, 0x3, 0x0, 0x6, 0x42, 0x4, 0x0, 0x5, 0x4, 0x51, 0xbba8, 0x0, 0x7, 0x7, 0x8, 0x1, 0x8001, 0x20, 0xffffffff, 0x7f, 0x9, 0x9, 0x2, 0xe05, 0x1, 0x6e, 0x4, 0x7, 0x8, 0x7fffffff, 0x80000001, 0x68fd7043, 0x9, 0x6, 0x0, 0xf8, 0x2, @perf_bp, 0x0, 0x1f, 0x0, 0x7, 0x3935a75b, 0x6, 0x7fff}, 0x0, 0x4, 0xffffffffffffffff, 0x2) close(r0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x9, 0x5, 0xf19, 0x0, 0x0, 0x4, 0x4000, 0x2, 0x8, 0x401, 0x5, 0x100000000000, 0x4, 0x50, 0xc95e, 0x4, 0x2, 0x2, 0x5, 0x3, 0x2, 0x69f6, 0x60000000000000, 0x5, 0x38, 0x1, 0x5, 0x844b, 0x8, 0x4, 0x8, 0x3, 0x401, 0x3ff, 0x4, 0xfffffffffffffffe, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0x18000, 0x4, 0x4fd, 0x9, 0x800, 0x8, 0x1}, r1, 0x8, r0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000200)={0x0, 0x70, 0x8, 0x4, 0xda, 0x4, 0x0, 0xfff, 0x8410, 0x8, 0x2, 0x5247, 0x7, 0x9, 0x4747c872, 0x6, 0x3, 0xffff, 0x400, 0x5, 0x101, 0x80000001, 0x159b, 0xfb, 0x0, 0xab83, 0x370, 0x3, 0x3, 0x4, 0x0, 0x942a, 0x80000000, 0x100000000, 0x2, 0x8, 0xa87, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000040), 0x2}, 0x821, 0xb2ec, 0x2, 0x7, 0x9, 0x7, 0x100000000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x6, 0x0) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x100000001, 0x0, 0x7fff, 0x8, 0x0, 0x5, 0x10, 0x1, 0x5, 0x1, 0x100000001, 0x3, 0x9f, 0x6, 0x6, 0xd6f, 0x96, 0x0, 0x1914, 0x4, 0x3, 0x1f, 0x0, 0x7, 0x3ff, 0xfffffffffffffc00, 0x4, 0x0, 0xff, 0xbd50000000000000, 0x80, 0x0, 0x1, 0x4, 0x7, 0x800, 0x0, 0x100000000, 0x2, @perf_bp={&(0x7f0000000400)}, 0x10000, 0x0, 0x0, 0x3, 0x400, 0x80000000, 0x10000}, r1, 0x1, r2, 0xb) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x5, 0xc, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100000001}, [@generic={0x8f, 0xfffffffffffffff9, 0x2, 0x0, 0x7f}, @jmp={0x5, 0xeb, 0x0, 0x5, 0x8, 0xfffffffffffffff8, 0x8}, @alu={0x7, 0x3, 0x5, 0x4, 0x0, 0xc}, @exit, @call={0x85, 0x0, 0x0, 0x47}, @alu={0x4, 0x7, 0x0, 0xb, 0x3, 0xfffffffffffffffc, 0xfffffffffffffff0}, @exit, @map={0x18, 0x1, 0x1, 0x0, 0x1}]}, &(0x7f0000000540)='GPL\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x3, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x3, 0x5}, 0x8, 0x10, &(0x7f00000005c0)={0x3, 0x8, 0x2, 0x2}, 0x10}, 0x70) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', 0x0, 0x8}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=0xffffffffffffffff, 0x4) setsockopt$sock_attach_bpf(r3, 0x10d, 0xb, &(0x7f0000000740)=r4, 0xc1f44e8da1dc7f4a) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cgroup.stat\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x101800, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000300)='\x00', r5}, 0x10) 10:52:10 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x60ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) 10:52:10 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0xffffffffffffff01, 0x80000001, 0x0, 0x0, 0x10001, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) [ 1358.174872][ T6663] __nla_validate_parse: 1 callbacks suppressed [ 1358.174905][ T6663] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:52:10 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0xf000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:52:11 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x10000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1358.585822][ T6665] device nr0 entered promiscuous mode [ 1358.604655][ T6673] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:52:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1358.868170][ T6680] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:52:11 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x11000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:52:11 executing program 1: 10:52:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1359.012440][ T6686] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1359.115616][ T6691] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1359.204526][ T6662] device nr0 entered promiscuous mode [ 1359.599052][ T6699] IPVS: ftp: loaded support on port[0] = 21 [ 1359.723211][ T6699] chnl_net:caif_netlink_parms(): no params data found [ 1359.840011][ T6699] bridge0: port 1(bridge_slave_0) entered blocking state [ 1359.847814][ T6699] bridge0: port 1(bridge_slave_0) entered disabled state [ 1359.856568][ T6699] device bridge_slave_0 entered promiscuous mode [ 1359.870411][ T6699] bridge0: port 2(bridge_slave_1) entered blocking state [ 1359.878108][ T6699] bridge0: port 2(bridge_slave_1) entered disabled state [ 1359.886378][ T6699] device bridge_slave_1 entered promiscuous mode [ 1359.894296][ T29] device bridge_slave_1 left promiscuous mode [ 1359.900536][ T29] bridge0: port 2(bridge_slave_1) entered disabled state [ 1359.944594][ T29] device bridge_slave_0 left promiscuous mode [ 1359.950785][ T29] bridge0: port 1(bridge_slave_0) entered disabled state [ 1361.586541][ T29] device hsr_slave_1 left promiscuous mode [ 1361.627833][ T29] device hsr_slave_0 left promiscuous mode [ 1361.718713][ T29] team0 (unregistering): Port device team_slave_1 removed [ 1361.730582][ T29] team0 (unregistering): Port device team_slave_0 removed [ 1361.742495][ T29] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1361.780855][ T29] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1361.882219][ T29] bond0 (unregistering): Released all slaves [ 1362.004422][ T6699] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1362.006769][ T6702] IPVS: ftp: loaded support on port[0] = 21 [ 1362.025479][ T6699] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1362.063936][ T6699] team0: Port device team_slave_0 added [ 1362.086739][ T6699] team0: Port device team_slave_1 added [ 1362.236633][ T6699] device hsr_slave_0 entered promiscuous mode [ 1362.293836][ T6699] device hsr_slave_1 entered promiscuous mode [ 1362.382907][ T6702] chnl_net:caif_netlink_parms(): no params data found [ 1362.480799][ T6702] bridge0: port 1(bridge_slave_0) entered blocking state [ 1362.488496][ T6702] bridge0: port 1(bridge_slave_0) entered disabled state [ 1362.498267][ T6702] device bridge_slave_0 entered promiscuous mode [ 1362.507480][ T6702] bridge0: port 2(bridge_slave_1) entered blocking state [ 1362.515352][ T6702] bridge0: port 2(bridge_slave_1) entered disabled state [ 1362.524086][ T6702] device bridge_slave_1 entered promiscuous mode [ 1362.567170][ T6699] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1362.576941][ T6702] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1362.594462][ T5942] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1362.606875][ T5942] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1362.614960][ T5942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1362.625155][ T6702] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1362.644659][ T6699] 8021q: adding VLAN 0 to HW filter on device team0 [ 1362.665707][ T6702] team0: Port device team_slave_0 added [ 1362.686764][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1362.696025][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1362.705059][T26106] bridge0: port 1(bridge_slave_0) entered blocking state [ 1362.712183][T26106] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1362.720853][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1362.730842][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1362.739857][T26106] bridge0: port 2(bridge_slave_1) entered blocking state [ 1362.747037][T26106] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1362.755245][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1362.766641][ T6702] team0: Port device team_slave_1 added [ 1362.787526][ T5942] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1362.797749][ T5942] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1362.814714][ T5942] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1362.830628][ T5942] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1362.840552][ T5942] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1362.870211][ T6699] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1362.882526][ T6699] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1362.893423][T15778] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1362.901559][T15778] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1363.006380][ T6702] device hsr_slave_0 entered promiscuous mode [ 1363.054019][ T6702] device hsr_slave_1 entered promiscuous mode [ 1363.096711][ T6699] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1363.226562][ T6702] 8021q: adding VLAN 0 to HW filter on device bond0 10:52:15 executing program 2: 10:52:15 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x12000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:52:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:52:15 executing program 1: 10:52:15 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) [ 1363.278423][ T6702] 8021q: adding VLAN 0 to HW filter on device team0 [ 1363.302257][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1363.313379][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1363.340362][T30413] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1363.351432][ T6716] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1363.376238][T30413] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1363.396460][T30413] bridge0: port 1(bridge_slave_0) entered blocking state [ 1363.403673][T30413] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1363.424313][T30413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1363.435045][T30413] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1363.444550][T30413] bridge0: port 2(bridge_slave_1) entered blocking state [ 1363.451695][T30413] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1363.469878][T30413] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1363.479992][T30413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1363.495370][ T6717] device nr0 entered promiscuous mode [ 1363.517280][ T6716] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1363.534599][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1363.542773][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1363.581328][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1363.610552][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1363.628092][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1363.639929][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1363.657234][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1363.678425][ T6702] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1363.694898][ T6702] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1363.714622][T30413] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1363.726829][T30413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1363.742598][T30413] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1363.812933][ T6702] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1364.010863][ T6733] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1364.021521][ T6733] CPU: 0 PID: 6733 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1364.029419][ T6733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1364.039516][ T6733] Call Trace: [ 1364.042941][ T6733] dump_stack+0x172/0x1f0 [ 1364.047306][ T6733] dump_header+0x10f/0xb6c [ 1364.051744][ T6733] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1364.058413][ T6733] ? ___ratelimit+0x60/0x595 [ 1364.063007][ T6733] ? do_raw_spin_unlock+0x57/0x270 [ 1364.068153][ T6733] oom_kill_process.cold+0x10/0x15 [ 1364.073295][ T6733] out_of_memory+0x79a/0x1280 [ 1364.078053][ T6733] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1364.083560][ T6733] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1364.089063][ T6733] ? oom_killer_disable+0x280/0x280 [ 1364.094293][ T6733] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1364.099962][ T6733] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1364.105539][ T6733] ? memcg_event_wake+0x230/0x230 [ 1364.110658][ T6733] ? retint_kernel+0x2b/0x2b [ 1364.115803][ T6733] memory_max_write+0x22f/0x390 [ 1364.120707][ T6733] ? mem_cgroup_write+0x360/0x360 [ 1364.125751][ T6733] cgroup_file_write+0x241/0x790 [ 1364.130704][ T6733] ? mem_cgroup_write+0x360/0x360 [ 1364.135741][ T6733] ? kill_css+0x380/0x380 [ 1364.140109][ T6733] ? kill_css+0x380/0x380 [ 1364.144551][ T6733] kernfs_fop_write+0x2b8/0x480 [ 1364.149414][ T6733] __vfs_write+0x8a/0x110 [ 1364.153757][ T6733] ? kernfs_fop_open+0xd80/0xd80 [ 1364.158717][ T6733] vfs_write+0x20c/0x580 [ 1364.162978][ T6733] ksys_write+0x14f/0x290 [ 1364.167343][ T6733] ? __ia32_sys_read+0xb0/0xb0 [ 1364.172118][ T6733] ? do_syscall_64+0x26/0x680 [ 1364.176801][ T6733] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1364.182884][ T6733] ? do_syscall_64+0x26/0x680 [ 1364.188384][ T6733] __x64_sys_write+0x73/0xb0 [ 1364.193191][ T6733] do_syscall_64+0xfd/0x680 [ 1364.198157][ T6733] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1364.204054][ T6733] RIP: 0033:0x4592c9 [ 1364.207964][ T6733] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1364.227610][ T6733] RSP: 002b:00007efdfeae0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1364.236285][ T6733] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 1364.244533][ T6733] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 1364.252897][ T6733] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1364.261802][ T6733] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efdfeae16d4 [ 1364.269784][ T6733] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 1364.288538][ T6733] memory: usage 5316kB, limit 0kB, failcnt 458619 [ 1364.295141][ T6733] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1364.302786][ T6733] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1364.310812][ T6733] Memory cgroup stats for /syz5: cache:60KB rss:4184KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4184KB inactive_file:116KB active_file:112KB unevictable:0KB [ 1364.333631][ T6733] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null) [ 1364.333674][ T6733] ,cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=6732,uid=0 [ 1364.352147][ T6733] Memory cgroup out of memory: Killed process 6732 (syz-executor.5) total-vm:72580kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB [ 1364.369384][ T1044] oom_reaper: reaped process 6732 (syz-executor.5), now anon-rss:0kB, file-rss:34852kB, shmem-rss:0kB [ 1364.409711][ T6714] device nr0 entered promiscuous mode 10:52:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0xffffffffffffff01, 0x80000001, 0x4, 0x0, 0x0, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 10:52:17 executing program 2: 10:52:17 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x13000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:52:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:52:17 executing program 1: 10:52:17 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0xfdef) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) [ 1364.626082][ T6702] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1364.653618][ T6741] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1364.668878][ T6702] CPU: 1 PID: 6702 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1364.676810][ T6702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1364.686880][ T6702] Call Trace: [ 1364.690212][ T6702] dump_stack+0x172/0x1f0 [ 1364.694571][ T6702] dump_header+0x10f/0xb6c [ 1364.699184][ T6702] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1364.705011][ T6702] ? ___ratelimit+0x60/0x595 [ 1364.709621][ T6702] ? do_raw_spin_unlock+0x57/0x270 [ 1364.714760][ T6702] oom_kill_process.cold+0x10/0x15 [ 1364.720523][ T6702] out_of_memory+0x79a/0x1280 [ 1364.725494][ T6702] ? lock_downgrade+0x880/0x880 [ 1364.730380][ T6702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1364.736748][ T6702] ? oom_killer_disable+0x280/0x280 [ 1364.741980][ T6702] ? find_held_lock+0x35/0x130 [ 1364.746793][ T6702] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1364.752370][ T6702] ? memcg_event_wake+0x230/0x230 [ 1364.757436][ T6702] ? do_raw_spin_unlock+0x57/0x270 [ 1364.762592][ T6702] ? _raw_spin_unlock+0x2d/0x50 [ 1364.767479][ T6702] try_charge+0x1042/0x1410 [ 1364.772047][ T6702] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1364.777633][ T6702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1364.784078][ T6702] ? kasan_check_read+0x11/0x20 [ 1364.788982][ T6702] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1364.794584][ T6702] mem_cgroup_try_charge+0x24d/0x5e0 [ 1364.799904][ T6702] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1364.805596][ T6702] __handle_mm_fault+0x1e1a/0x3eb0 [ 1364.810746][ T6702] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1364.816317][ T6702] ? find_held_lock+0x35/0x130 [ 1364.821115][ T6702] ? handle_mm_fault+0x292/0xa90 [ 1364.826103][ T6702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1364.832396][ T6702] ? kasan_check_read+0x11/0x20 [ 1364.837290][ T6702] handle_mm_fault+0x3b7/0xa90 [ 1364.842104][ T6702] __do_page_fault+0x5ef/0xda0 [ 1364.846907][ T6702] do_page_fault+0x71/0x57d [ 1364.851462][ T6702] ? page_fault+0x8/0x30 [ 1364.855904][ T6702] page_fault+0x1e/0x30 [ 1364.860080][ T6702] RIP: 0033:0x403672 [ 1364.863991][ T6702] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 79 86 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 99 3b 05 00 48 [ 1364.883869][ T6702] RSP: 002b:00007ffe8e75ef90 EFLAGS: 00010246 [ 1364.889953][ T6702] RAX: 0000000000000000 RBX: 000000000014cffe RCX: 0000000000412ed0 [ 1364.897943][ T6702] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffe8e7600c0 [ 1364.905930][ T6702] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000555555ffa940 [ 1364.913934][ T6702] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe8e7600c0 [ 1364.921926][ T6702] R13: 00007ffe8e7600b0 R14: 0000000000000000 R15: 00007ffe8e7600c0 10:52:17 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000300)={0x3, 0x70, 0x0, 0x0, 0x0, 0x2800, 0x0, 0xffffffffffff0001, 0x0, 0x0, 0x9, 0x2, 0x0, 0x8, 0x3ff, 0xfa8, 0x2, 0xffffffffffffffff, 0x0, 0x400, 0x1, 0x10000, 0x0, 0x80, 0x3, 0x26e7cd00, 0x5, 0x1, 0x7a8d, 0x3, 0x7, 0x8, 0x7, 0x0, 0x1, 0x5, 0x100000000, 0x101, 0x0, 0xbc, 0x4, @perf_config_ext={0x81, 0x7}, 0x100, 0x1, 0x0, 0xf, 0x94b5, 0x72a, 0x4}) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x200200484, 0x0) r5 = perf_event_open(0x0, 0xffffffffffffffff, 0x4, r3, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f0000000040)='&@[\x00') r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000140)=0x101) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a1, &(0x7f0000000680)='&@[\x00') r7 = perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x18bbd54d, 0x0, 0x0, 0x128c, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x5, 0x0, 0x7, 0x0, 0x3, 0x83eb, 0x0, 0x95, 0x0, 0x1000, 0x0, 0xe0000, 0x3ff, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0xfffffffffffffb32, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20640, 0xe7, 0xf1c, 0x0, 0xdcb1}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000000100)=0x7fff) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$TUNSETNOCSUM(r7, 0x400454c8, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000380)='ppp1\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) [ 1364.951287][ T6742] device nr0 entered promiscuous mode [ 1364.963701][ T6702] memory: usage 928kB, limit 0kB, failcnt 458627 [ 1364.970403][ T6702] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1364.981506][ T6702] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1364.989671][ T6702] Memory cgroup stats for /syz5: cache:60KB rss:24KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:24KB inactive_file:116KB active_file:112KB unevictable:0KB [ 1365.004129][ T6745] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1365.014959][ T6702] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=6702,uid=0 10:52:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1365.057997][ T6702] Memory cgroup out of memory: Killed process 6702 (syz-executor.5) total-vm:72448kB, anon-rss:72kB, file-rss:34828kB, shmem-rss:0kB [ 1365.075545][ T1044] oom_reaper: reaped process 6702 (syz-executor.5), now anon-rss:0kB, file-rss:33932kB, shmem-rss:0kB 10:52:17 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x14000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1365.138064][ T6751] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:52:17 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x4) socket$kcm(0x11, 0x2, 0x300) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280), 0x1}, 0x40004) sendmsg$kcm(r1, &(0x7f0000000440)={&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x3, 0x3, 0x4, 0x3}}, 0x80, 0x0, 0x0, &(0x7f0000000200)=[{0x18, 0x11f, 0x0, "a79e5aa3763e"}], 0x18}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 10:52:17 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x15000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:52:18 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x4) socket$kcm(0x11, 0x2, 0x300) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280), 0x1}, 0x40004) sendmsg$kcm(r1, &(0x7f0000000440)={&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x3, 0x3, 0x4, 0x3}}, 0x80, 0x0, 0x0, &(0x7f0000000200)=[{0x18, 0x11f, 0x0, "a79e5aa3763e"}], 0x18}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) [ 1365.546780][ T6764] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:52:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0xffffffffffffff01, 0x80000001, 0x4, 0x0, 0x0, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 10:52:18 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x20000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:52:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1365.788396][ T6774] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:52:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0xffffffffffffff01, 0x80000001, 0x4, 0x0, 0x0, 0x4000, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 10:52:18 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000002, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1366.346938][ T6743] device nr0 entered promiscuous mode 10:52:18 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x2000916d) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) 10:52:18 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000003, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:52:18 executing program 1: socketpair(0x0, 0x0, 0xb6, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0xffffffffffffffd8) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) close(r0) socket$kcm(0x10, 0x3, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a1e2410"}) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x0) 10:52:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:52:18 executing program 2: socketpair(0x1, 0x20000000000001, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f00000003c0)='cpuacct.usage_all\x00', 0x0, 0x0) sendmsg$kcm(r3, &(0x7f00000009c0)={&(0x7f0000000500)=@pppoe={0x18, 0x0, {0x2, @random="1250c8010805", 'batadv0\x00'}}, 0x80, 0x0, 0x0, 0x0, 0x132}, 0x5000040) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) write$cgroup_type(r3, &(0x7f0000000040)='threaded\x00', 0x41676b47103c5bd9) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f0000000340)=ANY=[]) socketpair(0x14, 0x3, 0x1, &(0x7f0000000140)) r5 = gettid() perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0xccd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @perf_config_ext}, r5, 0x0, r0, 0x0) openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580), 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f2, &(0x7f0000000580)='ip6_vti0\x00') r7 = openat$cgroup_ro(r2, &(0x7f00000002c0)='memory.stat\x00', 0x0, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r8, 0x4008240b, &(0x7f0000000000)={0x5, 0x70, 0x2, 0xfffffffffffff002, 0x1, 0x2, 0x0, 0x8, 0xf2004, 0x106, 0x80000001, 0xa7c, 0x8, 0x9, 0xfff, 0x7, 0x7f, 0x4, 0xc9, 0x1, 0x6, 0xffffffff, 0x9, 0x6, 0x4, 0x7, 0x7f, 0xfd09, 0x5, 0x4, 0xfffffffffffffff9, 0x348b, 0x3, 0x7, 0x8001, 0xff, 0x63, 0x7, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000380), 0x8}, 0x100, 0x1, 0x4, 0xd, 0x2, 0x1000, 0x10000}) sendmsg$kcm(r7, 0x0, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000340)) r9 = gettid() r10 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x2, 0x5, 0x2, 0x9, 0x0, 0x159a, 0x200, 0x1, 0x6, 0x5, 0x2, 0x3, 0x2, 0x1, 0x200, 0x1, 0x2004b5932d8, 0x9, 0x40000000000004, 0x1c0, 0x82, 0x3, 0x2, 0x5, 0x40000000000002, 0x5, 0xa6, 0x5, 0x100000001, 0x8, 0x1, 0x2, 0x6, 0x8, 0x0, 0x8001, 0x0, 0x2, 0x2, @perf_config_ext={0xfff, 0x80}, 0x400480, 0x1, 0x3, 0x7, 0x20b9, 0x3f, 0x14}, r9, 0x0, r8, 0x5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r9, r8, 0x0, 0x19, &(0x7f0000000200)='\\procem0vboxnet1&nodev\x1e\'\x00', 0x0}, 0x30) r12 = gettid() ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r12, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000300)='[\x00', r11}, 0x30) [ 1366.537329][ T6794] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:52:19 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000004, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1366.690623][ T6806] device nr0 entered promiscuous mode 10:52:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1366.847365][ T6818] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:52:19 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000005, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:52:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1366.928988][ T6821] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:52:19 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x2, 0x73) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r1, 0x0, 0x9, &(0x7f0000000100)='cpu.stat\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7782, 0x7fffffff, 0x80, 0x767, 0x0, 0x5, 0x40034, 0x8, 0x8, 0x100000001, 0x5, 0x0, 0x7, 0x1, 0x0, 0x7, 0x5, 0x7, 0x10001, 0x2, 0x100, 0x3, 0x7, 0x6, 0x7, 0x1, 0x8, 0x7, 0x6e, 0xff, 0x12c800, 0x5, 0xe82e, 0xfffffffffffffc55, 0x9, 0x3, 0x0, 0x6, 0x0, @perf_config_ext={0xffffffff, 0xffffffffffffff34}, 0x28, 0x100, 0x20, 0xd, 0x4, 0xfff, 0x6}, r2, 0xf, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x5411, 0x72fffe) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) [ 1367.508349][ T6803] device nr0 entered promiscuous mode [ 1367.511066][ T6841] IPVS: ftp: loaded support on port[0] = 21 [ 1367.767328][ T6841] chnl_net:caif_netlink_parms(): no params data found [ 1367.799988][ T6841] bridge0: port 1(bridge_slave_0) entered blocking state [ 1367.807236][ T6841] bridge0: port 1(bridge_slave_0) entered disabled state [ 1367.815332][ T6841] device bridge_slave_0 entered promiscuous mode [ 1367.823073][ T8983] device bridge_slave_1 left promiscuous mode [ 1367.830029][ T8983] bridge0: port 2(bridge_slave_1) entered disabled state [ 1367.904544][ T8983] device bridge_slave_0 left promiscuous mode [ 1367.910734][ T8983] bridge0: port 1(bridge_slave_0) entered disabled state [ 1369.565592][ T8983] device hsr_slave_1 left promiscuous mode [ 1369.619172][ T8983] device hsr_slave_0 left promiscuous mode [ 1369.659361][ T8983] team0 (unregistering): Port device team_slave_1 removed [ 1369.671368][ T8983] team0 (unregistering): Port device team_slave_0 removed [ 1369.683230][ T8983] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1369.731947][ T8983] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1369.844303][ T8983] bond0 (unregistering): Released all slaves [ 1369.957148][ T6841] bridge0: port 2(bridge_slave_1) entered blocking state [ 1369.964373][ T6841] bridge0: port 2(bridge_slave_1) entered disabled state [ 1369.972126][ T6841] device bridge_slave_1 entered promiscuous mode [ 1369.991929][ T6841] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1370.002953][ T6841] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1370.022584][ T6841] team0: Port device team_slave_0 added [ 1370.030428][ T6841] team0: Port device team_slave_1 added [ 1370.095374][ T6841] device hsr_slave_0 entered promiscuous mode [ 1370.153889][ T6841] device hsr_slave_1 entered promiscuous mode [ 1370.268725][ T6841] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1370.282481][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1370.292957][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1370.301828][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1370.313673][ T6841] 8021q: adding VLAN 0 to HW filter on device team0 [ 1370.372439][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1370.382075][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1370.394256][T26106] bridge0: port 1(bridge_slave_0) entered blocking state [ 1370.401381][T26106] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1370.426754][T15778] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1370.435525][T15778] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1370.444994][T15778] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1370.455414][T15778] bridge0: port 2(bridge_slave_1) entered blocking state [ 1370.462504][T15778] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1370.472563][T15778] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1370.501705][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1370.518502][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1370.531726][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1370.547085][T26106] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1370.561782][ T6841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1370.588281][ T6841] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1370.814037][ T6850] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1370.826333][ T6850] CPU: 0 PID: 6850 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1370.834254][ T6850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1370.844329][ T6850] Call Trace: [ 1370.847746][ T6850] dump_stack+0x172/0x1f0 [ 1370.852108][ T6850] dump_header+0x10f/0xb6c [ 1370.856556][ T6850] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1370.862398][ T6850] ? ___ratelimit+0x60/0x595 [ 1370.867018][ T6850] ? do_raw_spin_unlock+0x57/0x270 [ 1370.872165][ T6850] oom_kill_process.cold+0x10/0x15 [ 1370.877313][ T6850] out_of_memory+0x79a/0x1280 [ 1370.882036][ T6850] ? __sched_text_start+0x8/0x8 [ 1370.887210][ T6850] ? oom_killer_disable+0x280/0x280 [ 1370.892456][ T6850] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1370.898042][ T6850] ? memcg_event_wake+0x230/0x230 [ 1370.903103][ T6850] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1370.908943][ T6850] ? cgroup_file_notify+0x140/0x1b0 [ 1370.914176][ T6850] memory_max_write+0x22f/0x390 [ 1370.919085][ T6850] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1370.924577][ T6850] ? mem_cgroup_write+0x360/0x360 [ 1370.929629][ T6850] ? lock_acquire+0x16f/0x3f0 [ 1370.934419][ T6850] ? kernfs_fop_write+0x227/0x480 [ 1370.939484][ T6850] cgroup_file_write+0x241/0x790 [ 1370.944646][ T6850] ? mem_cgroup_write+0x360/0x360 [ 1370.949697][ T6850] ? kill_css+0x380/0x380 [ 1370.954074][ T6850] ? kill_css+0x380/0x380 [ 1370.958429][ T6850] kernfs_fop_write+0x2b8/0x480 [ 1370.963309][ T6850] __vfs_write+0x8a/0x110 [ 1370.967668][ T6850] ? kernfs_fop_open+0xd80/0xd80 [ 1370.972627][ T6850] vfs_write+0x20c/0x580 [ 1370.976903][ T6850] ksys_write+0x14f/0x290 [ 1370.981260][ T6850] ? __ia32_sys_read+0xb0/0xb0 [ 1370.986073][ T6850] ? do_syscall_64+0x26/0x680 [ 1370.990779][ T6850] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1370.996967][ T6850] ? do_syscall_64+0x26/0x680 [ 1371.001680][ T6850] __x64_sys_write+0x73/0xb0 [ 1371.006301][ T6850] do_syscall_64+0xfd/0x680 [ 1371.010832][ T6850] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1371.016837][ T6850] RIP: 0033:0x4592c9 [ 1371.020752][ T6850] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1371.040372][ T6850] RSP: 002b:00007f9f7de80c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1371.048813][ T6850] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 1371.056806][ T6850] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 1371.064794][ T6850] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1371.072790][ T6850] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9f7de816d4 [ 1371.080789][ T6850] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 1371.126441][ T6850] memory: usage 5312kB, limit 0kB, failcnt 458628 [ 1371.133017][ T6850] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1371.148065][ T6850] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1371.161048][ T6850] Memory cgroup stats for /syz5: cache:60KB rss:4184KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4184KB inactive_file:116KB active_file:112KB unevictable:0KB [ 1371.189481][ T6850] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=6849,uid=0 [ 1371.208900][ T6850] Memory cgroup out of memory: Killed process 6849 (syz-executor.5) total-vm:72580kB, anon-rss:4236kB, file-rss:35748kB, shmem-rss:0kB [ 1371.228339][ T1044] oom_reaper: reaped process 6849 (syz-executor.5), now anon-rss:0kB, file-rss:34788kB, shmem-rss:0kB 10:52:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0xffffffffffffff01, 0x80000001, 0x4, 0x0, 0x10001, 0x0, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 10:52:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:52:23 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000100)='&') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') r1 = perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x70, 0x6, 0x1, 0x723172b6, 0x3, 0x0, 0x2, 0x200, 0x8, 0x3f, 0x1, 0x6e6, 0x5, 0x6, 0x20, 0x248, 0xe0, 0x5, 0x3ff, 0x8, 0xffffffff00000000, 0x9, 0xffffffffffffffff, 0x100, 0x1, 0x0, 0x80, 0x1, 0x2, 0x1212, 0x2159, 0x5, 0x8, 0x1, 0x62c, 0x53, 0x4, 0x0, 0x0, 0x3, @perf_config_ext={0x7, 0x4}, 0x3800, 0x392, 0x7, 0x0, 0xffff, 0x0, 0x12}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) 10:52:23 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000006, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:52:23 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r1, 0xb, 0x1, 0xfffffffffffffffc, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="2e0000002d00810065160b000000cab96eff4f65f35a0e00da1b4015f0403f00"/46, 0x2e}], 0x1}, 0x0) 10:52:23 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0xfffffdef) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) [ 1371.377056][ T6841] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1371.424653][ T6858] __nla_validate_parse: 1 callbacks suppressed [ 1371.424664][ T6858] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1371.425924][ T6853] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1371.433059][ T6841] CPU: 0 PID: 6841 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1371.449777][ T6841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1371.449784][ T6841] Call Trace: [ 1371.449812][ T6841] dump_stack+0x172/0x1f0 [ 1371.449832][ T6841] dump_header+0x10f/0xb6c [ 1371.449849][ T6841] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1371.449863][ T6841] ? ___ratelimit+0x60/0x595 [ 1371.449877][ T6841] ? do_raw_spin_unlock+0x57/0x270 [ 1371.449894][ T6841] oom_kill_process.cold+0x10/0x15 [ 1371.449910][ T6841] out_of_memory+0x79a/0x1280 [ 1371.449925][ T6841] ? lock_downgrade+0x880/0x880 [ 1371.449939][ T6841] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1371.449962][ T6841] ? oom_killer_disable+0x280/0x280 [ 1371.500682][ T6841] ? find_held_lock+0x35/0x130 [ 1371.500714][ T6841] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1371.500736][ T6841] ? memcg_event_wake+0x230/0x230 [ 1371.521734][ T6841] ? do_raw_spin_unlock+0x57/0x270 [ 1371.521753][ T6841] ? _raw_spin_unlock+0x2d/0x50 [ 1371.521775][ T6841] try_charge+0x1042/0x1410 [ 1371.521799][ T6841] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1371.521824][ T6841] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1371.537249][ T6841] ? kasan_check_read+0x11/0x20 [ 1371.537274][ T6841] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1371.537298][ T6841] mem_cgroup_try_charge+0x24d/0x5e0 [ 1371.547755][ T6841] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1371.547774][ T6841] wp_page_copy+0x416/0x1770 [ 1371.547786][ T6841] ? do_wp_page+0x486/0x1500 [ 1371.547806][ T6841] ? pmd_pfn+0x1d0/0x1d0 [ 1371.547826][ T6841] ? lock_downgrade+0x880/0x880 [ 1371.547843][ T6841] ? swp_swapcount+0x540/0x540 [ 1371.547857][ T6841] ? do_raw_spin_unlock+0x57/0x270 [ 1371.547874][ T6841] ? kasan_check_read+0x11/0x20 [ 1371.547887][ T6841] ? do_raw_spin_unlock+0x57/0x270 [ 1371.547904][ T6841] do_wp_page+0x48e/0x1500 [ 1371.547925][ T6841] ? finish_mkwrite_fault+0x540/0x540 [ 1371.547951][ T6841] __handle_mm_fault+0x22e3/0x3eb0 [ 1371.564270][ T6841] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1371.564287][ T6841] ? find_held_lock+0x35/0x130 [ 1371.564304][ T6841] ? handle_mm_fault+0x292/0xa90 [ 1371.564331][ T6841] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1371.564347][ T6841] ? kasan_check_read+0x11/0x20 [ 1371.564365][ T6841] handle_mm_fault+0x3b7/0xa90 [ 1371.564386][ T6841] __do_page_fault+0x5ef/0xda0 [ 1371.564407][ T6841] do_page_fault+0x71/0x57d [ 1371.564432][ T6841] ? page_fault+0x8/0x30 [ 1371.575472][ T6841] page_fault+0x1e/0x30 [ 1371.575485][ T6841] RIP: 0033:0x4303a6 [ 1371.575501][ T6841] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 46 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 bc 4b 64 00 85 c0 0f 84 [ 1371.575509][ T6841] RSP: 002b:00007ffc2c75b8a0 EFLAGS: 00010206 [ 1371.575531][ T6841] RAX: 0000000000019691 RBX: 0000000000714640 RCX: 0000000000008041 [ 1371.575540][ T6841] RDX: 00005555572d9930 RSI: 00005555572e1970 RDI: 0000000000000003 [ 1371.575548][ T6841] RBP: 0000000000008041 R08: 0000000000000001 R09: 00005555572d8940 [ 1371.575555][ T6841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000714698 [ 1371.575562][ T6841] R13: 0000000000714698 R14: 0000000000000000 R15: 0000000000002710 [ 1371.606159][ T6841] memory: usage 924kB, limit 0kB, failcnt 458640 [ 1371.634554][ T6841] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1371.640359][ T6841] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1371.640373][ T6841] Memory cgroup stats for /syz5: cache:60KB rss:24KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:24KB inactive_file:116KB active_file:112KB unevictable:0KB [ 1371.654562][ T6841] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=6841,uid=0 10:52:24 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x2000916d) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) [ 1371.665826][ T6841] Memory cgroup out of memory: Killed process 6841 (syz-executor.5) total-vm:72448kB, anon-rss:76kB, file-rss:34828kB, shmem-rss:0kB [ 1371.706467][ T1044] oom_reaper: reaped process 6841 (syz-executor.5), now anon-rss:0kB, file-rss:33932kB, shmem-rss:0kB 10:52:24 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000007, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1371.873572][ T6870] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1371.879431][ T6862] device nr0 entered promiscuous mode 10:52:24 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000008, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:52:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:52:24 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0xffffffffffffff01, 0x80000001, 0x4, 0x0, 0x10001, 0x0, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) [ 1372.305386][ T6873] device nr0 entered promiscuous mode 10:52:24 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0xfffffffffffffdef) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) 10:52:24 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000009, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1372.437201][ T6888] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:52:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0xffffffffffffff01, 0x80000001, 0x4, 0x0, 0x10001, 0x0, 0x6, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) [ 1372.550374][ T6891] device nr0 entered promiscuous mode [ 1372.589761][ T6895] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:52:25 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0xfffffdef) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) 10:52:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:52:25 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x4000000a, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:52:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x17, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x57, 0x25}}, &(0x7f0000000100)='PL \x00L\xf7Q*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdc\x00\x00\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 1372.997379][ T6904] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:52:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:52:25 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000010, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:52:25 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, r2, 0x0, 0x7, &(0x7f0000000540)='system\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={0x0, r2, 0x0, 0x7, &(0x7f0000000500)='system\x00', r4}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) [ 1373.202257][ T6912] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:52:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="fb0000002e000104bfa9d345e7eb8d99c1ffffffffffffff43bc59198183fe204ee2d7080000000600000000000000801d5291d76b8c67452107132daffa33021eb82169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c33b047f720f4e89978112322628c7c1fbab650cdcafa532d3524ea85b198cb49066bf549933875e91431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a861b9390ddbad539ef278168ac8d157a656737a7ac0226d366ccec93f9f070000000000008e9234feee7baa2acd2683d489", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1373.288063][ T6919] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1373.392441][ T6924] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:52:25 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000011, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1374.026334][ T6936] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1374.046684][ T6897] device nr0 entered promiscuous mode 10:52:26 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000100)) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) 10:52:26 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000048, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1374.284303][ T6941] IPVS: ftp: loaded support on port[0] = 21 [ 1374.429634][ T6931] device nr0 entered promiscuous mode [ 1374.458764][ T6947] device nr0 entered promiscuous mode [ 1374.707862][ T6941] chnl_net:caif_netlink_parms(): no params data found [ 1374.857710][ T6941] bridge0: port 1(bridge_slave_0) entered blocking state [ 1374.865304][ T6941] bridge0: port 1(bridge_slave_0) entered disabled state [ 1374.874036][ T6941] device bridge_slave_0 entered promiscuous mode [ 1374.970472][ T6941] bridge0: port 2(bridge_slave_1) entered blocking state [ 1374.977801][ T6941] bridge0: port 2(bridge_slave_1) entered disabled state [ 1374.986237][ T6941] device bridge_slave_1 entered promiscuous mode [ 1375.008311][ T6941] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1375.087808][ T6941] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1375.110526][ T6941] team0: Port device team_slave_0 added [ 1375.118491][ T6941] team0: Port device team_slave_1 added [ 1375.236565][ T6941] device hsr_slave_0 entered promiscuous mode [ 1375.294494][ T6941] device hsr_slave_1 entered promiscuous mode [ 1375.402984][ T6950] device nr0 entered promiscuous mode [ 1375.451420][ T8983] device bridge_slave_1 left promiscuous mode [ 1375.458578][ T8983] bridge0: port 2(bridge_slave_1) entered disabled state [ 1375.494312][ T8983] device bridge_slave_0 left promiscuous mode [ 1375.500503][ T8983] bridge0: port 1(bridge_slave_0) entered disabled state [ 1377.246642][ T8983] device hsr_slave_1 left promiscuous mode [ 1377.319858][ T8983] device hsr_slave_0 left promiscuous mode [ 1377.387437][ T8983] team0 (unregistering): Port device team_slave_1 removed [ 1377.401901][ T8983] team0 (unregistering): Port device team_slave_0 removed [ 1377.414059][ T8983] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1377.448497][ T8983] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1377.542404][ T8983] bond0 (unregistering): Released all slaves [ 1377.669577][ T6941] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1377.696116][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1377.711230][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1377.722914][ T6941] 8021q: adding VLAN 0 to HW filter on device team0 [ 1377.741297][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1377.752266][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1377.761071][ T23] bridge0: port 1(bridge_slave_0) entered blocking state [ 1377.768224][ T23] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1377.785492][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1377.793669][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1377.802287][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1377.811241][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 1377.818403][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1377.826440][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1377.845312][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1377.854562][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1377.863931][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1377.872570][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1377.881564][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1377.890279][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1377.899768][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1377.908230][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1377.922780][ T6941] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1377.934926][ T6941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1377.942765][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1377.954901][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1378.016900][ T6941] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1378.201775][ T6962] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1378.219046][ T6962] CPU: 0 PID: 6962 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1378.226986][ T6962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1378.237109][ T6962] Call Trace: [ 1378.240433][ T6962] dump_stack+0x172/0x1f0 [ 1378.244798][ T6962] dump_header+0x10f/0xb6c [ 1378.249239][ T6962] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1378.255074][ T6962] ? ___ratelimit+0x60/0x595 [ 1378.259685][ T6962] ? do_raw_spin_unlock+0x57/0x270 [ 1378.264828][ T6962] oom_kill_process.cold+0x10/0x15 [ 1378.269974][ T6962] out_of_memory+0x79a/0x1280 [ 1378.274701][ T6962] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1378.280282][ T6962] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1378.285777][ T6962] ? oom_killer_disable+0x280/0x280 [ 1378.291001][ T6962] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1378.296721][ T6962] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1378.302294][ T6962] ? memcg_event_wake+0x230/0x230 [ 1378.307353][ T6962] ? retint_kernel+0x2b/0x2b [ 1378.311990][ T6962] memory_max_write+0x22f/0x390 [ 1378.316880][ T6962] ? mem_cgroup_write+0x360/0x360 [ 1378.322116][ T6962] cgroup_file_write+0x241/0x790 [ 1378.327084][ T6962] ? mem_cgroup_write+0x360/0x360 [ 1378.332140][ T6962] ? kill_css+0x380/0x380 [ 1378.336504][ T6962] ? kill_css+0x380/0x380 [ 1378.340869][ T6962] kernfs_fop_write+0x2b8/0x480 [ 1378.345757][ T6962] __vfs_write+0x8a/0x110 [ 1378.350193][ T6962] ? kernfs_fop_open+0xd80/0xd80 [ 1378.355178][ T6962] vfs_write+0x20c/0x580 [ 1378.359450][ T6962] ksys_write+0x14f/0x290 [ 1378.363805][ T6962] ? __ia32_sys_read+0xb0/0xb0 [ 1378.368592][ T6962] ? do_syscall_64+0x26/0x680 [ 1378.373292][ T6962] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1378.379383][ T6962] ? do_syscall_64+0x26/0x680 [ 1378.384103][ T6962] __x64_sys_write+0x73/0xb0 [ 1378.390203][ T6962] do_syscall_64+0xfd/0x680 [ 1378.394740][ T6962] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1378.400651][ T6962] RIP: 0033:0x4592c9 [ 1378.404566][ T6962] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1378.424224][ T6962] RSP: 002b:00007f06c81a3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1378.432687][ T6962] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 1378.440777][ T6962] RDX: 0000000000000012 RSI: 00000000200003c0 RDI: 0000000000000007 [ 1378.448778][ T6962] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1378.456790][ T6962] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f06c81a46d4 [ 1378.472784][ T6962] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 1378.491907][ T6962] memory: usage 5320kB, limit 0kB, failcnt 458641 [ 1378.500067][ T6962] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1378.512790][ T6962] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1378.520453][ T6962] Memory cgroup stats for /syz5: cache:60KB rss:4156KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4156KB inactive_file:116KB active_file:112KB unevictable:0KB [ 1378.543196][ T6962] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=6961,uid=0 [ 1378.560723][ T6962] Memory cgroup out of memory: Killed process 6961 (syz-executor.5) total-vm:72580kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB [ 1378.579900][ T1044] oom_reaper: reaped process 6961 (syz-executor.5), now anon-rss:0kB, file-rss:34788kB, shmem-rss:0kB 10:52:31 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0xffffffffffffff01, 0x80000001, 0x4, 0x0, 0x10001, 0x4000, 0x0, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 10:52:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="fb0000002e000104bfa9d345e7eb8d99c1ffffffffffffff43bc59198183fe204ee2d7080000000600000000000000801d5291d76b8c67452107132daffa33021eb82169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c33b047f720f4e89978112322628c7c1fbab650cdcafa532d3524ea85b198cb49066bf549933875e91431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a861b9390ddbad539ef278168ac8d157a656737a7ac0226d366ccec93f9f070000000000008e9234feee7baa2acd2683d489", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:52:31 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000300, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:52:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:52:31 executing program 1: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000008c0)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a80)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r1, 0xc0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000280)=0x6) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0x12, 0x1, 0xfffffffffffffff9, &(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000900)=ANY=[@ANYBLOB="9feb010018000000000000001000000028000000030000009c719a53b9d8d9c01c519cf3b4000000003a82370554ff46af03285cbec71b4e031601e33f435f0f9ad7acfe5eee83768f66a4f6b5240182f9183ea555730f5ccf19efe967c3339cb8ab0ae2b7857610ebfadb17cc67c5edde4a0b74fcc409aac0c9937b42785d62aed9c8253ad93b25658572ca07c47d0285243acdfe9494dfca2839aab9415d336f96986ff87d073d6928d58ee9d7a8c2d1faa3ea5741b8a511c78e87698dfbc8c25e375cf300009d5055303a30b8d85fb8fe4b9faf0c8c87d2ecda0ec72127ea9f9603"], 0x0, 0xe3, 0x0, 0x1}, 0x20) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB='+'], 0x1) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000180)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) openat$cgroup_ro(r2, &(0x7f0000000200)='cpuacct.usage_all\x00', 0x0, 0x0) 10:52:31 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') close(r2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r3, &(0x7f00000000c0), &(0x7f00000002c0)}, 0x20) r4 = openat$cgroup_subtree(r1, &(0x7f00000003c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000380), 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) [ 1378.898144][ T6941] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1378.932090][ T6965] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1378.949663][ T6941] CPU: 0 PID: 6941 Comm: syz-executor.5 Not tainted 5.2.0-rc3+ #16 [ 1378.957617][ T6941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1378.967701][ T6941] Call Trace: [ 1378.971030][ T6941] dump_stack+0x172/0x1f0 [ 1378.975390][ T6941] dump_header+0x10f/0xb6c [ 1378.979831][ T6941] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1378.985663][ T6941] ? ___ratelimit+0x60/0x595 [ 1378.990269][ T6941] ? do_raw_spin_unlock+0x57/0x270 [ 1378.995402][ T6941] oom_kill_process.cold+0x10/0x15 [ 1379.000554][ T6941] out_of_memory+0x79a/0x1280 [ 1379.005258][ T6941] ? lock_downgrade+0x880/0x880 [ 1379.010124][ T6941] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1379.016478][ T6941] ? oom_killer_disable+0x280/0x280 [ 1379.021698][ T6941] ? find_held_lock+0x35/0x130 [ 1379.026507][ T6941] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1379.032074][ T6941] ? memcg_event_wake+0x230/0x230 [ 1379.037136][ T6941] ? do_raw_spin_unlock+0x57/0x270 [ 1379.042282][ T6941] ? _raw_spin_unlock+0x2d/0x50 [ 1379.047249][ T6941] try_charge+0x1042/0x1410 [ 1379.051782][ T6941] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1379.057346][ T6941] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1379.063607][ T6941] ? kasan_check_read+0x11/0x20 [ 1379.068488][ T6941] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1379.074071][ T6941] mem_cgroup_try_charge+0x24d/0x5e0 [ 1379.079387][ T6941] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1379.085136][ T6941] wp_page_copy+0x416/0x1770 [ 1379.089758][ T6941] ? do_wp_page+0x486/0x1500 [ 1379.094382][ T6941] ? pmd_pfn+0x1d0/0x1d0 [ 1379.098655][ T6941] ? lock_downgrade+0x880/0x880 [ 1379.103541][ T6941] ? swp_swapcount+0x540/0x540 [ 1379.108336][ T6941] ? do_raw_spin_unlock+0x57/0x270 [ 1379.113474][ T6941] ? kasan_check_read+0x11/0x20 [ 1379.118353][ T6941] ? do_raw_spin_unlock+0x57/0x270 [ 1379.123491][ T6941] do_wp_page+0x48e/0x1500 [ 1379.127942][ T6941] ? finish_mkwrite_fault+0x540/0x540 [ 1379.133360][ T6941] __handle_mm_fault+0x22e3/0x3eb0 [ 1379.138515][ T6941] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1379.144085][ T6941] ? find_held_lock+0x35/0x130 [ 1379.148875][ T6941] ? handle_mm_fault+0x292/0xa90 [ 1379.153849][ T6941] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1379.160118][ T6941] ? kasan_check_read+0x11/0x20 [ 1379.165005][ T6941] handle_mm_fault+0x3b7/0xa90 [ 1379.170265][ T6941] __do_page_fault+0x5ef/0xda0 [ 1379.175156][ T6941] do_page_fault+0x71/0x57d [ 1379.179711][ T6941] ? page_fault+0x8/0x30 [ 1379.183977][ T6941] page_fault+0x1e/0x30 [ 1379.188145][ T6941] RIP: 0033:0x4303a6 [ 1379.192063][ T6941] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 46 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 bc 4b 64 00 85 c0 0f 84 [ 1379.211693][ T6941] RSP: 002b:00007fffb36673a0 EFLAGS: 00010206 [ 1379.217778][ T6941] RAX: 0000000000019691 RBX: 0000000000714640 RCX: 0000000000008041 [ 1379.225784][ T6941] RDX: 0000555556849930 RSI: 0000555556851970 RDI: 0000000000000003 [ 1379.233795][ T6941] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555556848940 [ 1379.241795][ T6941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000714698 [ 1379.249808][ T6941] R13: 0000000000714698 R14: 0000000000000000 R15: 0000000000002710 10:52:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1379.325273][ T6971] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1379.350138][ T6969] device nr0 entered promiscuous mode 10:52:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x13, 0x9, &(0x7f0000000100)=@raw=[@map={0x18, 0xd, 0x1, 0x0, 0xffffffffffffff9c}, @ldst={0x3, 0x2, 0x1, 0x9, 0x5, 0x40, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x200}, @call={0x85, 0x0, 0x0, 0x61}, @jmp={0x5, 0x101, 0x2, 0x3, 0x7, 0xfffffffffffffff0, 0x1}, @generic={0x10001, 0x6, 0x7ff, 0x145ca00, 0x89}, @alu={0x0, 0x5, 0xd, 0x7, 0x0, 0x10, 0x1}], &(0x7f0000000040)='syzkaller\x00', 0x20, 0x16, &(0x7f0000000200)=""/22, 0x41000, 0x0, [], 0x0, 0x11, 0xffffffffffffff9c, 0x8, &(0x7f0000000240)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0x5, 0xaf, 0x5}, 0x10}, 0x70) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000380)=r2) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000002700050ad25a80648c63940d0124fc0010000a400a000000053582c137153e370900088004001700d1bd", 0x2e}], 0x1}, 0x0) [ 1379.470744][ T6976] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:52:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1379.513077][ T6979] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1379.534378][ T6979] netlink: 'syz-executor.2': attribute type 8 has an invalid length. [ 1379.558887][ T6981] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1379.592324][ T6981] netlink: 'syz-executor.2': attribute type 8 has an invalid length. [ 1379.629542][ T6984] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:52:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x20fe2d7a4d96bb68, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee405dc09000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f0000000040)}, 0x10) [ 1379.643467][ T6941] memory: usage 932kB, limit 0kB, failcnt 458649 [ 1379.649989][ T6941] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1379.667339][ T6941] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1379.684967][ T6941] Memory cgroup stats for /syz5: cache:60KB rss:56KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:56KB inactive_file:116KB active_file:112KB unevictable:0KB [ 1379.685951][ T6985] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:52:32 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000500, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1379.732316][ T6941] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=6941,uid=0 10:52:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1379.778655][ T6941] Memory cgroup out of memory: Killed process 6941 (syz-executor.5) total-vm:72448kB, anon-rss:68kB, file-rss:34828kB, shmem-rss:0kB [ 1379.798783][ T1044] oom_reaper: reaped process 6941 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 1379.819566][ T6974] device nr0 entered promiscuous mode [ 1379.944497][ T7001] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:52:32 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0xffffffffffffff01, 0x80000001, 0x4, 0x0, 0x10001, 0x4000, 0x0, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 10:52:32 executing program 2: r0 = socket$kcm(0xa, 0x9, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, 0x0}, 0x40000000) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x8, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x20000400000037, 0x0, 0x0, 0x0, 0x0, r1}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = socket$kcm(0xa, 0x2, 0x73) r4 = openat$cgroup(r2, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r5, 0x400454cb, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x400000, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x4, 0x4, 0x0) ioctl$TUNSETTXFILTER(r6, 0x400454d1, &(0x7f0000000500)=ANY=[@ANYBLOB="2869fbe23a6484e09601c1e3e592000000000000f971860a4605b9b0175362a60000000004f3dfab427308cd4fc2bcd1a35cf4e97c1db88979b925dc04a12d8b6e62df7533560b5cf06ebdad6e47901a2565fc251ca8dbed9f76407903ac0513e6bfad67cb8b12752ae2365900bb97aa6139d7a3934828f4"]) socketpair(0x9, 0x5, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x10, 0x3, 0x6000000000000, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 10:52:32 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x15, 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="62353000080000001161030000000000"], &(0x7f00000002c0)='GPL\x00', 0x9, 0xdf, &(0x7f0000000440)=""/223, 0x41100, 0x1, [], 0x0, 0xf, r0, 0x8, &(0x7f0000000340)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x2, 0x9, 0x5, 0xfc20}, 0x10}, 0x70) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) gettid() r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) 10:52:32 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000600, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1380.422054][ T7012] device nr0 entered promiscuous mode 10:52:33 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:52:33 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x7, 0x70, 0x7fc, 0xffffffffffffff01, 0x80000001, 0x4, 0x0, 0x10001, 0x4000, 0x0, 0x81, 0x5, 0x8, 0xd991, 0x7, 0xb2a7, 0x101, 0x71b6beec, 0xfffffffffffffff9, 0x2, 0x2, 0x0, 0x9, 0x6, 0x100, 0x8, 0x8, 0x7, 0xfffffffffffffffb, 0x10001, 0x9db, 0x400, 0x1ff, 0x7f, 0x7fffffff, 0x400, 0x5, 0xfffffffffffeffff, 0x0, 0x80, 0x3, @perf_config_ext={0x5, 0x9}, 0x200, 0x4, 0x3, 0x7, 0x9, 0x4f78, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000001f000018e1ebcf7385c08082595fb90b71b400000018000000020000000000000000000002020000000000000000000004000000000000"], &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) sendmsg(r6, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r7 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) sendmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)="3f459b38641cc37b7071636d5f84ccbbd47050cf0bdace5fa36972bf4336926c5d17807f75d6b39cdac0a61be89ec277", 0x30}], 0x1}, 0x4) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r8 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r4, 0x0, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x100, 0x12) 10:52:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x40000209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000280)="ad1faaf97d63a232c313afd47451bef9cda851", 0x0}, 0x20) r1 = socket$kcm(0xa, 0x802, 0x88) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000300)={0x0, r2, 0xc, 0x2}, 0x14) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, &(0x7f00000014c0), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="3800efffffff7c9dbd0000290000000400000078040409000000c0073b10fbff0000b408000000fab7711721190022000000000000000087ec7de4"], 0x38}, 0x8000) bpf$MAP_LOOKUP_ELEM(0xb, &(0x7f0000000340)={r0, &(0x7f00000004c0)="f8920771522caa6db44b5b2853f212a28d01d2eff9e9ecae7348b210ae01da92a6e640681a269ea3b07bfb757cd38a1411e29983fcb65fe0b38b7bd4be4af1b1708d26c5", 0x0}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000040)="7821700c0079783b548d1344c9ce73e079895f6b3417a535e1dc196d05ee25314364028b455ad3", 0x0}, 0x18) r3 = gettid() perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x5, 0x0, 0x6, 0xe89f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfe, 0x6, 0x0, 0x0, 0x5e3, 0x100000001, 0x1596, 0x80000001, 0x7fffffff, 0x3, 0x9, 0x400, 0x5, 0xfffffffffffffffc, 0x9, 0x3, 0x0, 0xd6, 0x5cc26e07, 0xfffffffffffffffa, 0x1, 0x3f, 0x0, 0x101, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000580), 0x4}, 0x20d0, 0x4, 0x6, 0x0, 0x3}, r3, 0x2, 0xffffffffffffff9c, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f0000000440)="7fd611506ec905f12652677816672009ffee5fac02fd070ef4a3be8c43d88ad97736275bc631486e2a8679c8a7745b4b5ff86fa092af7d9a85d708693f6154fa69338946aaa6f996104c18f4fdbcbf8cbc21a2", 0x0}, 0x18) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f00000003c0)="a992cd379e6ad583677f86486cf9c102ec70bf", &(0x7f0000000640)="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", 0x4}, 0x20) 10:52:33 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000700, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:52:33 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4002}) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x339) close(r0) [ 1380.697699][ T7030] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:52:33 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000900, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:52:33 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40000a00, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:52:33 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1381.218265][ T7030] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:52:33 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40001100, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) [ 1381.337638][ T7051] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 10:52:33 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x5) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1f000000180081ac02041cecff091ffa1c1400050049778a28761a485ead3a", 0x1f}], 0x1}, 0x0) [ 1381.456989][ T7059] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1381.466463][ T7058] device nr0 entered promiscuous mode 10:52:34 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001440)=@nl=@unspec={0x40003f00, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8ad2c4aa412d00"/72, 0x48}], 0x1}, 0x0) 10:52:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1, 0x0, 0x0, 0x0}, 0x0) 10:52:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000003040)={0x13, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000004a0000009500000000000000"], &(0x7f0000000600)='GPL\x00', 0x4, 0xd7, &(0x7f0000000640)=""/215, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xffffffffffffffff}, 0x10}, 0x70) recvmsg(0xffffffffffffff9c, &(0x7f0000003180)={&(0x7f0000002e40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003000)=[{&(0x7f0000002ec0)=""/214, 0xd6}, {&(0x7f0000002fc0)}], 0x2, &(0x7f00000030c0)=""/142, 0x8e}, 0x40) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff, 0x9, 0x18}, 0xc) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200)=r1, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000031c0)=0xffffffffffffffff, 0x1e7) bpf$PROG_LOAD(0x5, &(0x7f0000003280)={0x13, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xfc, &(0x7f00000000c0)=""/252, 0x40f00, 0x3, [], r0, 0xf, r2, 0x8, &(0x7f0000003200)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000003240)={0x4, 0x6, 0x6, 0x400}, 0x10}, 0x70) 10:52:34 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x7, 0x4, 0x8, 0xc0f, 0x0, 0x5, 0x20c80, 0x9, 0xd4eb, 0x7, 0x4, 0x6, 0x2, 0xe74, 0x315, 0x2, 0x7, 0x80000001, 0x8, 0x9, 0x283, 0x4, 0x5, 0x8, 0x7, 0x100000000, 0x9, 0x3f, 0xff, 0x5, 0x9, 0x1f, 0x5, 0xbc, 0xffffffffffffff7f, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x2}, 0x61, 0x3, 0x100000000, 0x9, 0x9, 0x2, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) recvmsg(r1, &(0x7f0000004980)={&(0x7f0000004340)=@can={0x1d, 0x0}, 0x80, &(0x7f0000004880)=[{&(0x7f00000043c0)=""/80, 0x50}, {&(0x7f0000004440)=""/232, 0xe8}, {&(0x7f0000004540)=""/96, 0x60}, {&(0x7f00000045c0)=""/49, 0x31}, {&(0x7f0000004600)=""/116, 0x74}, {&(0x7f0000004680)=""/241, 0xf1}, {&(0x7f0000004780)=""/234, 0xea}], 0x7, &(0x7f0000004900)=""/93, 0x5d}, 0x40010041) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'rose0\x00'}) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004b00)={&(0x7f00000049c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@func={0x1, 0x0, 0x0, 0xc, 0x3}, @var={0xc, 0x0, 0x0, 0xe, 0x1}, @restrict={0xb, 0x0, 0x0, 0xb, 0x2}]}, {0x0, [0x2e, 0x61, 0x61, 0x30]}}, &(0x7f0000004a40)=""/143, 0x46, 0x8f}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000004b40)={0xe, 0x5, 0x4, 0x7, 0x110, 0xffffffffffffff9c, 0x3ff, [], r3, r4, 0x2, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\\\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) recvmsg(r1, &(0x7f000000b440)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b380)=""/167, 0xa7}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004300)={0x17, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) [ 1382.051044][ T7077] device nr0 entered promiscuous mode [ 1382.239028][ T7087] IPVS: ftp: loaded support on port[0] = 21 [ 1382.441547][ T7087] chnl_net:caif_netlink_parms(): no params data found [ 1382.541151][ T7087] bridge0: port 1(bridge_slave_0) entered blocking state [ 1382.548901][ T7087] bridge0: port 1(bridge_slave_0) entered disabled state [ 1382.558616][ T7087] device bridge_slave_0 entered promiscuous mode [ 1382.567551][ T7087] bridge0: port 2(bridge_slave_1) entered blocking state [ 1382.574786][ T7087] bridge0: port 2(bridge_slave_1) entered disabled state [ 1382.582539][ T7087] device bridge_slave_1 entered promiscuous mode [ 1382.590190][ T8983] device bridge_slave_1 left promiscuous mode [ 1382.597103][ T8983] bridge0: port 2(bridge_slave_1) entered disabled state [ 1382.654606][ T8983] device bridge_slave_0 left promiscuous mode [ 1382.660858][ T8983] bridge0: port 1(bridge_slave_0) entered disabled state [ 1384.386778][ T8983] device hsr_slave_1 left promiscuous mode [ 1384.429849][ T8983] device hsr_slave_0 left promiscuous mode [ 1384.477025][ T8983] team0 (unregistering): Port device team_slave_1 removed [ 1384.490976][ T8983] team0 (unregistering): Port device team_slave_0 removed [ 1384.502848][ T8983] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1384.547480][ T8983] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1384.622784][ T8983] bond0 (unregistering): Released all slaves [ 1384.715503][ T7087] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1384.726410][ T7087] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1384.747169][ T7087] team0: Port device team_slave_0 added [ 1384.754986][ T7087] team0: Port device team_slave_1 added [ 1384.816428][ T7087] device hsr_slave_0 entered promiscuous mode [ 1384.863673][ T7087] device hsr_slave_1 entered promiscuous mode [ 1384.964714][ T8983] ------------[ cut here ]------------ [ 1384.971998][ T8983] ODEBUG: free active (active state 0) object type: timer_list hint: delayed_work_timer_fn+0x0/0x90 [ 1384.983181][ T8983] WARNING: CPU: 1 PID: 8983 at lib/debugobjects.c:325 debug_print_object+0x168/0x250 [ 1384.992152][ T7087] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1384.992666][ T8983] Kernel panic - not syncing: panic_on_warn set ... [ 1385.005850][ T8983] CPU: 1 PID: 8983 Comm: kworker/u4:6 Not tainted 5.2.0-rc3+ #16 [ 1385.013574][ T8983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1385.023645][ T8983] Workqueue: netns cleanup_net [ 1385.028396][ T8983] Call Trace: [ 1385.031701][ T8983] dump_stack+0x172/0x1f0 [ 1385.036042][ T8983] ? debug_print_object+0x90/0x250 [ 1385.041220][ T8983] panic+0x2cb/0x744 [ 1385.045148][ T8983] ? __warn_printk+0xf3/0xf3 [ 1385.049842][ T8983] ? debug_print_object+0x168/0x250 [ 1385.055043][ T8983] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1385.061300][ T8983] ? __warn.cold+0x5/0x4d [ 1385.065658][ T8983] ? __warn+0xe8/0x1d0 [ 1385.069721][ T8983] ? debug_print_object+0x168/0x250 [ 1385.074926][ T8983] __warn.cold+0x20/0x4d [ 1385.079181][ T8983] ? debug_print_object+0x168/0x250 [ 1385.084373][ T8983] report_bug+0x263/0x2b0 [ 1385.089435][ T8983] do_error_trap+0x11b/0x200 [ 1385.094138][ T8983] do_invalid_op+0x37/0x50 [ 1385.098562][ T8983] ? debug_print_object+0x168/0x250 [ 1385.103755][ T8983] invalid_op+0x14/0x20 [ 1385.108096][ T8983] RIP: 0010:debug_print_object+0x168/0x250 [ 1385.113903][ T8983] Code: dd 60 cb a4 87 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 00 00 00 48 8b 14 dd 60 cb a4 87 48 c7 c7 00 c1 a4 87 e8 36 81 0d fe <0f> 0b 83 05 eb 55 4b 06 01 48 83 c4 20 5b 41 5c 41 5d 41 5e 5d c3 [ 1385.133515][ T8983] RSP: 0018:ffff888068117838 EFLAGS: 00010086 [ 1385.139592][ T8983] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 1385.147579][ T8983] RDX: 0000000000000000 RSI: ffffffff815ac936 RDI: ffffed100d022ef9 [ 1385.155643][ T8983] RBP: ffff888068117878 R08: ffff88806810a080 R09: ffffed1015d240f1 [ 1385.163631][ T8983] R10: ffffed1015d240f0 R11: ffff8880ae920787 R12: 0000000000000001 [ 1385.171595][ T8983] R13: ffffffff88bad1a0 R14: ffffffff816039b0 R15: ffff8880a8e897a0 [ 1385.179572][ T8983] ? calc_wheel_index+0x220/0x220 [ 1385.184624][ T8983] ? vprintk_func+0x86/0x189 [ 1385.189227][ T8983] ? debug_print_object+0x168/0x250 [ 1385.194608][ T8983] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1385.200433][ T8983] debug_check_no_obj_freed+0x29f/0x464 [ 1385.205982][ T8983] kfree+0xbd/0x220 [ 1385.209785][ T8983] kvfree+0x61/0x70 [ 1385.213600][ T8983] netdev_freemem+0x4c/0x60 [ 1385.218115][ T8983] netdev_release+0x86/0xb0 [ 1385.222613][ T8983] ? xps_cpus_store+0x2b0/0x2b0 [ 1385.227466][ T8983] device_release+0x7a/0x210 [ 1385.232057][ T8983] kobject_put.cold+0x289/0x2e6 [ 1385.236902][ T8983] netdev_run_todo+0x53b/0x7c0 [ 1385.241659][ T8983] ? register_netdev+0x50/0x50 [ 1385.246422][ T8983] ? unregister_netdevice_queue+0x1d2/0x2c0 [ 1385.252510][ T8983] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1385.258931][ T8983] ? net_set_todo+0xbf/0x150 [ 1385.263518][ T8983] rtnl_unlock+0xe/0x10 [ 1385.267930][ T8983] default_device_exit_batch+0x358/0x410 [ 1385.273581][ T8983] ? unregister_netdevice_many+0x50/0x50 [ 1385.279231][ T8983] ? default_device_exit+0x203/0x290 [ 1385.284562][ T8983] ? do_wait_intr_irq+0x2b0/0x2b0 [ 1385.289586][ T8983] ? rtnl_unlock+0xe/0x10 [ 1385.293920][ T8983] ? unregister_netdevice_many+0x50/0x50 [ 1385.299563][ T8983] ? dev_change_net_namespace+0xc70/0xc70 [ 1385.305281][ T8983] ops_exit_list.isra.0+0xfc/0x150 [ 1385.310483][ T8983] cleanup_net+0x3fb/0x960 [ 1385.314916][ T8983] ? netns_install+0x1d0/0x1d0 [ 1385.319704][ T8983] process_one_work+0x989/0x1790 [ 1385.324644][ T8983] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1385.330115][ T8983] ? lock_acquire+0x16f/0x3f0 [ 1385.334814][ T8983] worker_thread+0x98/0xe40 [ 1385.339327][ T8983] ? trace_hardirqs_on+0x67/0x220 [ 1385.344351][ T8983] kthread+0x354/0x420 [ 1385.348413][ T8983] ? process_one_work+0x1790/0x1790 [ 1385.353618][ T8983] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1385.359958][ T8983] ret_from_fork+0x24/0x30 [ 1385.364368][ T8983] [ 1385.364372][ T8983] ====================================================== [ 1385.364375][ T8983] WARNING: possible circular locking dependency detected [ 1385.364377][ T8983] 5.2.0-rc3+ #16 Not tainted [ 1385.364380][ T8983] ------------------------------------------------------ [ 1385.364383][ T8983] kworker/u4:6/8983 is trying to acquire lock: [ 1385.364385][ T8983] 00000000892f6e1e ((console_sem).lock){-.-.}, at: down_trylock+0x13/0x70 [ 1385.364393][ T8983] [ 1385.364396][ T8983] but task is already holding lock: [ 1385.364398][ T8983] 000000007fdb3c78 (&obj_hash[i].lock){-.-.}, at: debug_check_no_obj_freed+0xbe/0x464 [ 1385.364406][ T8983] [ 1385.364409][ T8983] which lock already depends on the new lock. [ 1385.364410][ T8983] [ 1385.364411][ T8983] [ 1385.364414][ T8983] the existing dependency chain (in reverse order) is: [ 1385.364416][ T8983] [ 1385.364417][ T8983] -> #3 (&obj_hash[i].lock){-.-.}: [ 1385.364425][ T8983] _raw_spin_lock_irqsave+0x95/0xcd [ 1385.364427][ T8983] __debug_object_init+0xc6/0xc30 [ 1385.364430][ T8983] debug_object_init+0x16/0x20 [ 1385.364432][ T8983] hrtimer_init+0x2a/0x300 [ 1385.364434][ T8983] init_dl_task_timer+0x1b/0x50 [ 1385.364436][ T8983] __sched_fork+0x22a/0x4f0 [ 1385.364438][ T8983] init_idle+0x75/0x670 [ 1385.364441][ T8983] sched_init+0x952/0x9f5 [ 1385.364443][ T8983] start_kernel+0x393/0x893 [ 1385.364445][ T8983] x86_64_start_reservations+0x29/0x2b [ 1385.364448][ T8983] x86_64_start_kernel+0x77/0x7b [ 1385.364450][ T8983] secondary_startup_64+0xa4/0xb0 [ 1385.364451][ T8983] [ 1385.364453][ T8983] -> #2 (&rq->lock){-.-.}: [ 1385.364460][ T8983] _raw_spin_lock+0x2f/0x40 [ 1385.364462][ T8983] task_fork_fair+0x6a/0x520 [ 1385.364465][ T8983] sched_fork+0x3af/0x900 [ 1385.364467][ T8983] copy_process.part.0+0x1a25/0x6790 [ 1385.364469][ T8983] _do_fork+0x25d/0xfe0 [ 1385.364471][ T8983] kernel_thread+0x34/0x40 [ 1385.364473][ T8983] rest_init+0x28/0x37b [ 1385.364476][ T8983] arch_call_rest_init+0xe/0x1b [ 1385.364478][ T8983] start_kernel+0x854/0x893 [ 1385.364480][ T8983] x86_64_start_reservations+0x29/0x2b [ 1385.364483][ T8983] x86_64_start_kernel+0x77/0x7b [ 1385.364485][ T8983] secondary_startup_64+0xa4/0xb0 [ 1385.364486][ T8983] [ 1385.364488][ T8983] -> #1 (&p->pi_lock){-.-.}: [ 1385.364495][ T8983] _raw_spin_lock_irqsave+0x95/0xcd [ 1385.364498][ T8983] try_to_wake_up+0x90/0x13f0 [ 1385.364500][ T8983] wake_up_process+0x10/0x20 [ 1385.364502][ T8983] __up.isra.0+0x136/0x1a0 [ 1385.364504][ T8983] up+0x9c/0xe0 [ 1385.364506][ T8983] __up_console_sem+0xb7/0x1c0 [ 1385.364509][ T8983] console_unlock+0x663/0xec0 [ 1385.364511][ T8983] vprintk_emit+0x2a0/0x700 [ 1385.364513][ T8983] vprintk_default+0x28/0x30 [ 1385.364515][ T8983] vprintk_func+0x7e/0x189 [ 1385.364517][ T8983] printk+0xba/0xed [ 1385.364519][ T8983] do_exit.cold+0x5d/0x254 [ 1385.364533][ T8983] do_group_exit+0x135/0x370 [ 1385.364535][ T8983] __x64_sys_exit_group+0x44/0x50 [ 1385.364537][ T8983] do_syscall_64+0xfd/0x680 [ 1385.364540][ T8983] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1385.364541][ T8983] [ 1385.364543][ T8983] -> #0 ((console_sem).lock){-.-.}: [ 1385.364550][ T8983] lock_acquire+0x16f/0x3f0 [ 1385.364553][ T8983] _raw_spin_lock_irqsave+0x95/0xcd [ 1385.364555][ T8983] down_trylock+0x13/0x70 [ 1385.364558][ T8983] __down_trylock_console_sem+0xa8/0x210 [ 1385.364560][ T8983] console_trylock+0x15/0xa0 [ 1385.364562][ T8983] vprintk_emit+0x283/0x700 [ 1385.364564][ T8983] vprintk_default+0x28/0x30 [ 1385.364567][ T8983] vprintk_func+0x7e/0x189 [ 1385.364569][ T8983] printk+0xba/0xed [ 1385.364571][ T8983] __warn_printk+0x9b/0xf3 [ 1385.364573][ T8983] debug_print_object+0x168/0x250 [ 1385.364576][ T8983] debug_check_no_obj_freed+0x29f/0x464 [ 1385.364578][ T8983] kfree+0xbd/0x220 [ 1385.364580][ T8983] kvfree+0x61/0x70 [ 1385.364582][ T8983] netdev_freemem+0x4c/0x60 [ 1385.364585][ T8983] netdev_release+0x86/0xb0 [ 1385.364587][ T8983] device_release+0x7a/0x210 [ 1385.364589][ T8983] kobject_put.cold+0x289/0x2e6 [ 1385.364592][ T8983] netdev_run_todo+0x53b/0x7c0 [ 1385.364594][ T8983] rtnl_unlock+0xe/0x10 [ 1385.364597][ T8983] default_device_exit_batch+0x358/0x410 [ 1385.364599][ T8983] ops_exit_list.isra.0+0xfc/0x150 [ 1385.364601][ T8983] cleanup_net+0x3fb/0x960 [ 1385.364604][ T8983] process_one_work+0x989/0x1790 [ 1385.364606][ T8983] worker_thread+0x98/0xe40 [ 1385.364608][ T8983] kthread+0x354/0x420 [ 1385.364610][ T8983] ret_from_fork+0x24/0x30 [ 1385.364611][ T8983] [ 1385.364614][ T8983] other info that might help us debug this: [ 1385.364615][ T8983] [ 1385.364617][ T8983] Chain exists of: [ 1385.364618][ T8983] (console_sem).lock --> &rq->lock --> &obj_hash[i].lock [ 1385.364628][ T8983] [ 1385.364630][ T8983] Possible unsafe locking scenario: [ 1385.364631][ T8983] [ 1385.364634][ T8983] CPU0 CPU1 [ 1385.364636][ T8983] ---- ---- [ 1385.364637][ T8983] lock(&obj_hash[i].lock); [ 1385.364642][ T8983] lock(&rq->lock); [ 1385.364648][ T8983] lock(&obj_hash[i].lock); [ 1385.364652][ T8983] lock((console_sem).lock); [ 1385.364656][ T8983] [ 1385.364658][ T8983] *** DEADLOCK *** [ 1385.364659][ T8983] [ 1385.364662][ T8983] 4 locks held by kworker/u4:6/8983: [ 1385.364663][ T8983] #0: 00000000ce393174 ((wq_completion)netns){+.+.}, at: process_one_work+0x87e/0x1790 [ 1385.364672][ T8983] #1: 0000000091479c02 (net_cleanup_work){+.+.}, at: process_one_work+0x8b4/0x1790 [ 1385.364682][ T8983] #2: 000000004a68fe47 (pernet_ops_rwsem){++++}, at: cleanup_net+0xae/0x960 [ 1385.364691][ T8983] #3: 000000007fdb3c78 (&obj_hash[i].lock){-.-.}, at: debug_check_no_obj_freed+0xbe/0x464 [ 1385.364700][ T8983] [ 1385.364702][ T8983] stack backtrace: [ 1385.364705][ T8983] CPU: 1 PID: 8983 Comm: kworker/u4:6 Not tainted 5.2.0-rc3+ #16 [ 1385.364709][ T8983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1385.364711][ T8983] Workqueue: netns cleanup_net [ 1385.364714][ T8983] Call Trace: [ 1385.364716][ T8983] dump_stack+0x172/0x1f0 [ 1385.364718][ T8983] print_circular_bug.cold+0x1cc/0x28f [ 1385.364721][ T8983] __lock_acquire+0x3755/0x5490 [ 1385.364723][ T8983] ? mark_held_locks+0xf0/0xf0 [ 1385.364725][ T8983] ? enable_ptr_key_workfn+0x30/0x30 [ 1385.364727][ T8983] ? kvm_clock_read+0x18/0x30 [ 1385.364729][ T8983] ? kvm_sched_clock_read+0x9/0x20 [ 1385.364731][ T8983] lock_acquire+0x16f/0x3f0 [ 1385.364733][ T8983] ? down_trylock+0x13/0x70 [ 1385.364736][ T8983] _raw_spin_lock_irqsave+0x95/0xcd [ 1385.364738][ T8983] ? down_trylock+0x13/0x70 [ 1385.364740][ T8983] ? vprintk_emit+0x283/0x700 [ 1385.364742][ T8983] down_trylock+0x13/0x70 [ 1385.364744][ T8983] ? vprintk_emit+0x283/0x700 [ 1385.364746][ T8983] __down_trylock_console_sem+0xa8/0x210 [ 1385.364748][ T8983] console_trylock+0x15/0xa0 [ 1385.364750][ T8983] vprintk_emit+0x283/0x700 [ 1385.364753][ T8983] ? calc_wheel_index+0x220/0x220 [ 1385.364755][ T8983] vprintk_default+0x28/0x30 [ 1385.364757][ T8983] vprintk_func+0x7e/0x189 [ 1385.364758][ T8983] printk+0xba/0xed [ 1385.364761][ T8983] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1385.364763][ T8983] ? mark_held_locks+0xf0/0xf0 [ 1385.364765][ T8983] ? mark_held_locks+0xf0/0xf0 [ 1385.364767][ T8983] ? __warn_printk+0x8f/0xf3 [ 1385.364769][ T8983] ? queue_work_node+0x360/0x360 [ 1385.364771][ T8983] __warn_printk+0x9b/0xf3 [ 1385.364773][ T8983] ? add_taint.cold+0x16/0x16 [ 1385.364775][ T8983] ? kasan_check_write+0x14/0x20 [ 1385.364778][ T8983] ? lock_downgrade+0x880/0x880 [ 1385.364780][ T8983] ? queue_work_node+0x360/0x360 [ 1385.364782][ T8983] debug_print_object+0x168/0x250 [ 1385.364785][ T8983] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1385.364787][ T8983] debug_check_no_obj_freed+0x29f/0x464 [ 1385.364789][ T8983] kfree+0xbd/0x220 [ 1385.364791][ T8983] kvfree+0x61/0x70 [ 1385.364793][ T8983] netdev_freemem+0x4c/0x60 [ 1385.364795][ T8983] netdev_release+0x86/0xb0 [ 1385.364797][ T8983] ? xps_cpus_store+0x2b0/0x2b0 [ 1385.364799][ T8983] device_release+0x7a/0x210 [ 1385.364801][ T8983] kobject_put.cold+0x289/0x2e6 [ 1385.364803][ T8983] netdev_run_todo+0x53b/0x7c0 [ 1385.364806][ T8983] ? register_netdev+0x50/0x50 [ 1385.364808][ T8983] ? unregister_netdevice_queue+0x1d2/0x2c0 [ 1385.364811][ T8983] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1385.364813][ T8983] ? net_set_todo+0xbf/0x150 [ 1385.364815][ T8983] rtnl_unlock+0xe/0x10 [ 1385.364817][ T8983] default_device_exit_batch+0x358/0x410 [ 1385.364820][ T8983] ? unregister_netdevice_many+0x50/0x50 [ 1385.364822][ T8983] ? default_device_exit+0x203/0x290 [ 1385.364824][ T8983] ? do_wait_intr_irq+0x2b0/0x2b0 [ 1385.364826][ T8983] ? rtnl_unlock+0xe/0x10 [ 1385.364829][ T8983] ? unregister_netdevice_many+0x50/0x50 [ 1385.364831][ T8983] ? dev_change_net_namespace+0xc70/0xc70 [ 1385.364833][ T8983] ops_exit_list.isra.0+0xfc/0x150 [ 1385.364835][ T8983] cleanup_net+0x3fb/0x960 [ 1385.364838][ T8983] ? netns_install+0x1d0/0x1d0 [ 1385.364840][ T8983] process_one_work+0x989/0x1790 [ 1385.364842][ T8983] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1385.364844][ T8983] ? lock_acquire+0x16f/0x3f0 [ 1385.364846][ T8983] worker_thread+0x98/0xe40 [ 1385.364848][ T8983] ? trace_hardirqs_on+0x67/0x220 [ 1385.364850][ T8983] kthread+0x354/0x420 [ 1385.364853][ T8983] ? process_one_work+0x1790/0x1790 [ 1385.364855][ T8983] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1385.364858][ T8983] ret_from_fork+0x24/0x30 [ 1385.365977][ T8983] Kernel Offset: disabled [ 1386.303010][ T8983] Rebooting in 86400 seconds..