106] debugfs: Directory 'hsr0' with parent '/' already present! [ 1591.083679][T22070] 8021q: adding VLAN 0 to HW filter on device team0 [ 1591.107279][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1591.123144][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1591.153534][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1591.173297][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1591.192479][T18353] bridge0: port 1(bridge_slave_0) entered blocking state [ 1591.199566][T18353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1591.242777][T12886] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1591.251161][T12886] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1591.273569][T12886] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1591.292570][T12886] bridge0: port 2(bridge_slave_1) entered blocking state [ 1591.299764][T12886] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1591.312684][T12886] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1591.335525][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1591.346002][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1591.355763][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1591.382906][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1591.391654][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1591.401139][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1591.429641][T22070] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1591.441052][T22070] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1591.458933][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1591.473231][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1591.493344][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1591.513356][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1591.559207][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1591.594025][T22070] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1591.614304][T22106] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1591.659352][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1591.668432][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1591.697048][T22106] 8021q: adding VLAN 0 to HW filter on device team0 [ 1591.729511][T22148] IPVS: ftp: loaded support on port[0] = 21 [ 1591.729516][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1591.730145][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1591.759448][ T2851] bridge0: port 1(bridge_slave_0) entered blocking state [ 1591.766659][ T2851] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1591.775835][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1591.814152][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1591.833082][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1591.843386][ T2851] bridge0: port 2(bridge_slave_1) entered blocking state [ 1591.850474][ T2851] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1591.858492][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1591.894997][T12886] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1591.913190][T12886] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1591.936700][T12886] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1591.957235][T12886] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1592.004146][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1592.015497][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1592.069022][T22106] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1592.092021][T22106] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1592.103976][T22154] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1592.115344][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1592.133201][T22154] CPU: 0 PID: 22154 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 1592.135133][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1592.141145][T22154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1592.158886][T22154] Call Trace: [ 1592.162185][T22154] dump_stack+0x172/0x1f0 [ 1592.166523][T22154] dump_header+0x10b/0x82d [ 1592.170944][T22154] oom_kill_process.cold+0x10/0x15 [ 1592.173446][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1592.176065][T22154] out_of_memory+0x334/0x1340 [ 1592.188542][T22154] ? __sched_text_start+0x8/0x8 [ 1592.192960][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1592.193397][T22154] ? oom_killer_disable+0x280/0x280 [ 1592.206552][T22154] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1592.212101][T22154] ? memcg_stat_show+0xc40/0xc40 [ 1592.217043][T22154] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1592.222853][T22154] ? cgroup_file_notify+0x140/0x1b0 [ 1592.222872][T22154] memory_max_write+0x262/0x3a0 [ 1592.222889][T22154] ? mem_cgroup_write+0x370/0x370 [ 1592.222908][T22154] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1592.222927][T22154] cgroup_file_write+0x241/0x790 [ 1592.232952][T22154] ? mem_cgroup_write+0x370/0x370 [ 1592.232971][T22154] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1592.232991][T22154] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1592.233011][T22154] kernfs_fop_write+0x2b8/0x480 [ 1592.253380][T22154] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1592.264592][T22154] __vfs_write+0x8a/0x110 [ 1592.264607][T22154] ? kernfs_fop_open+0xd80/0xd80 [ 1592.264622][T22154] vfs_write+0x268/0x5d0 [ 1592.264639][T22154] ksys_write+0x14f/0x290 [ 1592.264656][T22154] ? __ia32_sys_read+0xb0/0xb0 [ 1592.289132][T22154] __x64_sys_write+0x73/0xb0 [ 1592.302422][T22154] do_syscall_64+0xfa/0x760 [ 1592.311471][T22154] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1592.317347][T22154] RIP: 0033:0x459a59 [ 1592.317362][T22154] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1592.317369][T22154] RSP: 002b:00007fbc2072cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1592.317382][T22154] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 1592.317389][T22154] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1592.317396][T22154] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1592.317409][T22154] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc2072d6d4 [ 1592.340872][T22154] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 1592.435365][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1592.528620][T22106] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1592.549552][T22148] chnl_net:caif_netlink_parms(): no params data found [ 1592.676103][T22148] bridge0: port 1(bridge_slave_0) entered blocking state [ 1592.692370][T22148] bridge0: port 1(bridge_slave_0) entered disabled state [ 1592.712491][T22148] device bridge_slave_0 entered promiscuous mode [ 1592.732395][T22154] memory: usage 3184kB, limit 0kB, failcnt 354 [ 1592.739570][T22148] bridge0: port 2(bridge_slave_1) entered blocking state [ 1592.762330][T22148] bridge0: port 2(bridge_slave_1) entered disabled state [ 1592.765017][T22154] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1592.789258][T22148] device bridge_slave_1 entered promiscuous mode [ 1592.795764][T22154] Memory cgroup stats for /syz4: [ 1592.795864][T22154] anon 2134016 [ 1592.795864][T22154] file 40960 [ 1592.795864][T22154] kernel_stack 0 [ 1592.795864][T22154] slab 966656 [ 1592.795864][T22154] sock 0 [ 1592.795864][T22154] shmem 0 [ 1592.795864][T22154] file_mapped 0 [ 1592.795864][T22154] file_dirty 0 [ 1592.795864][T22154] file_writeback 0 [ 1592.795864][T22154] anon_thp 2097152 [ 1592.795864][T22154] inactive_anon 0 [ 1592.795864][T22154] active_anon 2134016 [ 1592.795864][T22154] inactive_file 131072 [ 1592.795864][T22154] active_file 0 [ 1592.795864][T22154] unevictable 0 [ 1592.795864][T22154] slab_reclaimable 405504 [ 1592.795864][T22154] slab_unreclaimable 561152 [ 1592.795864][T22154] pgfault 37323 [ 1592.795864][T22154] pgmajfault 0 [ 1592.795864][T22154] workingset_refault 0 [ 1592.795864][T22154] workingset_activate 0 [ 1592.795864][T22154] workingset_nodereclaim 0 [ 1592.795864][T22154] pgrefill 69 [ 1592.795864][T22154] pgscan 5378 [ 1592.795864][T22154] pgsteal 5230 [ 1592.795864][T22154] pgactivate 99 [ 1592.812092][T22154] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=22153,uid=0 [ 1592.957337][T22148] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1592.985073][T22148] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1593.029033][T22148] team0: Port device team_slave_0 added [ 1593.054880][T22148] team0: Port device team_slave_1 added [ 1593.096892][T22154] Memory cgroup out of memory: Killed process 22153 (syz-executor.4) total-vm:72580kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 1593.140056][T22161] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1593.141125][ T1072] oom_reaper: reaped process 22153 (syz-executor.4), now anon-rss:0kB, file-rss:33856kB, shmem-rss:0kB [ 1593.166205][T22148] device hsr_slave_0 entered promiscuous mode [ 1593.173972][T22161] CPU: 0 PID: 22161 Comm: syz-executor.1 Not tainted 5.4.0-rc1+ #0 [ 1593.181889][T22161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1593.192126][T22161] Call Trace: [ 1593.195429][T22161] dump_stack+0x172/0x1f0 [ 1593.199770][T22161] dump_header+0x10b/0x82d [ 1593.204199][T22161] oom_kill_process.cold+0x10/0x15 [ 1593.209316][T22161] out_of_memory+0x334/0x1340 [ 1593.214002][T22161] ? oom_killer_disable+0x280/0x280 [ 1593.219217][T22161] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1593.224762][T22161] ? memcg_stat_show+0xc40/0xc40 [ 1593.230581][T22161] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1593.236396][T22161] ? cgroup_file_notify+0x140/0x1b0 [ 1593.241609][T22161] memory_max_write+0x262/0x3a0 [ 1593.246895][T22161] ? mem_cgroup_write+0x370/0x370 [ 1593.251967][T22161] ? cgroup_file_write+0x86/0x790 [ 1593.257002][T22161] cgroup_file_write+0x241/0x790 [ 1593.262186][T22161] ? mem_cgroup_write+0x370/0x370 [ 1593.267197][T22161] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1593.272838][T22161] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1593.278454][T22161] kernfs_fop_write+0x2b8/0x480 [ 1593.283289][T22161] __vfs_write+0x8a/0x110 [ 1593.287621][T22161] ? kernfs_fop_open+0xd80/0xd80 [ 1593.292547][T22161] vfs_write+0x268/0x5d0 [ 1593.296773][T22161] ksys_write+0x14f/0x290 [ 1593.301084][T22161] ? __ia32_sys_read+0xb0/0xb0 [ 1593.305833][T22161] ? do_syscall_64+0x26/0x760 [ 1593.310492][T22161] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1593.316610][T22161] ? do_syscall_64+0x26/0x760 [ 1593.321353][T22161] __x64_sys_write+0x73/0xb0 [ 1593.325946][T22161] do_syscall_64+0xfa/0x760 [ 1593.330440][T22161] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1593.336339][T22161] RIP: 0033:0x459a59 [ 1593.340218][T22161] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1593.359823][T22161] RSP: 002b:00007f9359a19c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1593.368244][T22161] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 1593.376307][T22161] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1593.384265][T22161] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1593.392237][T22161] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9359a1a6d4 [ 1593.400201][T22161] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 1593.423973][T22161] memory: usage 3256kB, limit 0kB, failcnt 866 [ 1593.430380][T22161] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1593.438358][T22161] Memory cgroup stats for /syz1: [ 1593.439324][T22161] anon 2162688 [ 1593.439324][T22161] file 0 [ 1593.439324][T22161] kernel_stack 0 [ 1593.439324][T22161] slab 909312 [ 1593.439324][T22161] sock 0 [ 1593.439324][T22161] shmem 0 [ 1593.439324][T22161] file_mapped 0 [ 1593.439324][T22161] file_dirty 0 [ 1593.439324][T22161] file_writeback 0 [ 1593.439324][T22161] anon_thp 2097152 [ 1593.439324][T22161] inactive_anon 0 [ 1593.439324][T22161] active_anon 2162688 [ 1593.439324][T22161] inactive_file 0 [ 1593.439324][T22161] active_file 0 [ 1593.439324][T22161] unevictable 0 [ 1593.439324][T22161] slab_reclaimable 270336 [ 1593.439324][T22161] slab_unreclaimable 638976 [ 1593.439324][T22161] pgfault 15444 [ 1593.439324][T22161] pgmajfault 0 [ 1593.439324][T22161] workingset_refault 0 [ 1593.439324][T22161] workingset_activate 0 [ 1593.439324][T22161] workingset_nodereclaim 0 [ 1593.439324][T22161] pgrefill 0 [ 1593.439324][T22161] pgscan 33 [ 1593.439324][T22161] pgsteal 0 [ 1593.439324][T22161] pgactivate 0 [ 1593.539265][T22161] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=22160,uid=0 [ 1593.558459][T22161] Memory cgroup out of memory: Killed process 22160 (syz-executor.1) total-vm:72580kB, anon-rss:2180kB, file-rss:35800kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 1593.577962][T22148] device hsr_slave_1 entered promiscuous mode [ 1593.586258][ T1072] oom_reaper: reaped process 22160 (syz-executor.1), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB 00:13:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xf0ffffff, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:13:09 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:13:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r5, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r5, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r4, 0x0, 0x0) 00:13:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x7a000000, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1593.642046][T22148] debugfs: Directory 'hsr0' with parent '/' already present! [ 1593.680603][T22070] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 00:13:09 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)=@isdn={0x22, 0x400, 0x100000000, 0x1f06, 0x1}, 0x80, &(0x7f0000000340)}, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0xcc539d13aa130b24, 0x0) write$cgroup_int(r6, 0x0, 0x0) [ 1593.768740][T22070] CPU: 1 PID: 22070 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 1593.776666][T22070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1593.786729][T22070] Call Trace: [ 1593.790045][T22070] dump_stack+0x172/0x1f0 [ 1593.794388][T22070] dump_header+0x10b/0x82d [ 1593.798810][T22070] ? oom_kill_process+0x94/0x3f0 [ 1593.803758][T22070] oom_kill_process.cold+0x10/0x15 [ 1593.808879][T22070] out_of_memory+0x334/0x1340 [ 1593.813569][T22070] ? lock_downgrade+0x920/0x920 [ 1593.818433][T22070] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 1593.824355][T22070] ? oom_killer_disable+0x280/0x280 [ 1593.829572][T22070] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1593.835134][T22070] ? memcg_stat_show+0xc40/0xc40 [ 1593.840088][T22070] ? do_raw_spin_unlock+0x57/0x270 [ 1593.845211][T22070] ? _raw_spin_unlock+0x2d/0x50 [ 1593.850077][T22070] try_charge+0xf4b/0x1440 [ 1593.854545][T22070] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1593.860092][T22070] ? percpu_ref_tryget_live+0x111/0x290 00:13:09 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1593.860757][T22170] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1593.865643][T22070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1593.865660][T22070] ? __kasan_check_read+0x11/0x20 [ 1593.865677][T22070] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1593.865695][T22070] mem_cgroup_try_charge+0x136/0x590 [ 1593.865716][T22070] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1593.865735][T22070] wp_page_copy+0x407/0x1860 [ 1593.865752][T22070] ? find_held_lock+0x35/0x130 [ 1593.865767][T22070] ? do_wp_page+0x53b/0x15c0 [ 1593.865786][T22070] ? pmd_devmap_trans_unstable+0x220/0x220 [ 1593.865803][T22070] ? lock_downgrade+0x920/0x920 [ 1593.865822][T22070] ? swp_swapcount+0x540/0x540 [ 1593.865837][T22070] ? __kasan_check_read+0x11/0x20 [ 1593.865849][T22070] ? do_raw_spin_unlock+0x57/0x270 [ 1593.865867][T22070] do_wp_page+0x543/0x15c0 [ 1593.865887][T22070] ? finish_mkwrite_fault+0x6a0/0x6a0 [ 1593.865909][T22070] __handle_mm_fault+0x23ec/0x4040 [ 1593.865930][T22070] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1593.962699][T22070] ? handle_mm_fault+0x292/0xaa0 [ 1593.967658][T22070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1593.973910][T22070] ? __kasan_check_read+0x11/0x20 [ 1593.978954][T22070] handle_mm_fault+0x3b7/0xaa0 [ 1593.983742][T22070] __do_page_fault+0x536/0xdd0 [ 1593.988540][T22070] do_page_fault+0x38/0x590 [ 1593.993055][T22070] page_fault+0x39/0x40 [ 1593.997213][T22070] RIP: 0033:0x430b36 [ 1594.001138][T22070] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 44 64 00 85 c0 0f 84 [ 1594.020759][T22070] RSP: 002b:00007ffed3fe4910 EFLAGS: 00010206 [ 1594.026818][T22070] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1594.026826][T22070] RDX: 0000000001326930 RSI: 000000000132e970 RDI: 0000000000000003 [ 1594.026833][T22070] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000001325940 [ 1594.026840][T22070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1594.026847][T22070] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 [ 1594.076957][T22148] 8021q: adding VLAN 0 to HW filter on device bond0 00:13:09 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1594.123625][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1594.143173][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1594.160586][T22148] 8021q: adding VLAN 0 to HW filter on device team0 [ 1594.182325][T22070] memory: usage 820kB, limit 0kB, failcnt 366 [ 1594.188700][T22070] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1594.207852][T22070] Memory cgroup stats for /syz4: [ 1594.207966][T22070] anon 24576 [ 1594.207966][T22070] file 40960 [ 1594.207966][T22070] kernel_stack 0 [ 1594.207966][T22070] slab 966656 [ 1594.207966][T22070] sock 0 [ 1594.207966][T22070] shmem 0 [ 1594.207966][T22070] file_mapped 0 [ 1594.207966][T22070] file_dirty 0 [ 1594.207966][T22070] file_writeback 0 [ 1594.207966][T22070] anon_thp 0 [ 1594.207966][T22070] inactive_anon 0 [ 1594.207966][T22070] active_anon 24576 [ 1594.207966][T22070] inactive_file 131072 [ 1594.207966][T22070] active_file 0 [ 1594.207966][T22070] unevictable 0 [ 1594.207966][T22070] slab_reclaimable 405504 [ 1594.207966][T22070] slab_unreclaimable 561152 [ 1594.207966][T22070] pgfault 37323 [ 1594.207966][T22070] pgmajfault 0 [ 1594.207966][T22070] workingset_refault 0 [ 1594.207966][T22070] workingset_activate 0 [ 1594.207966][T22070] workingset_nodereclaim 0 [ 1594.207966][T22070] pgrefill 69 [ 1594.207966][T22070] pgscan 5378 [ 1594.207966][T22070] pgsteal 5230 [ 1594.207966][T22070] pgactivate 99 [ 1594.218702][T22070] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=22070,uid=0 00:13:09 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1594.502876][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1594.531688][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1594.562105][ T2851] bridge0: port 1(bridge_slave_0) entered blocking state [ 1594.569241][ T2851] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1594.602282][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1594.612144][T22167] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1594.613322][T22070] Memory cgroup out of memory: Killed process 22070 (syz-executor.4) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 [ 1594.642191][T22106] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1594.642695][ T1072] oom_reaper: reaped process 22070 (syz-executor.4), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 1594.667692][T22106] CPU: 1 PID: 22106 Comm: syz-executor.1 Not tainted 5.4.0-rc1+ #0 [ 1594.668432][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1594.675621][T22106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1594.675627][T22106] Call Trace: [ 1594.675647][T22106] dump_stack+0x172/0x1f0 [ 1594.675666][T22106] dump_header+0x10b/0x82d [ 1594.675678][T22106] ? oom_kill_process+0x94/0x3f0 [ 1594.675693][T22106] oom_kill_process.cold+0x10/0x15 [ 1594.675709][T22106] out_of_memory+0x334/0x1340 [ 1594.675724][T22106] ? lock_downgrade+0x920/0x920 [ 1594.675744][T22106] ? oom_killer_disable+0x280/0x280 [ 1594.675767][T22106] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1594.675783][T22106] ? memcg_stat_show+0xc40/0xc40 [ 1594.675801][T22106] ? do_raw_spin_unlock+0x57/0x270 [ 1594.675817][T22106] ? _raw_spin_unlock+0x2d/0x50 [ 1594.675835][T22106] try_charge+0xf4b/0x1440 [ 1594.675865][T22106] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1594.708041][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1594.710887][T22106] ? percpu_ref_tryget_live+0x111/0x290 [ 1594.710906][T22106] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1594.710924][T22106] ? __kasan_check_read+0x11/0x20 [ 1594.735353][ T2851] bridge0: port 2(bridge_slave_1) entered blocking state [ 1594.736228][T22106] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1594.736248][T22106] mem_cgroup_try_charge+0x136/0x590 [ 1594.741191][ T2851] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1594.746268][T22106] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1594.746284][T22106] wp_page_copy+0x407/0x1860 [ 1594.746299][T22106] ? find_held_lock+0x35/0x130 [ 1594.746316][T22106] ? do_wp_page+0x53b/0x15c0 [ 1594.788173][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1594.792808][T22106] ? pmd_devmap_trans_unstable+0x220/0x220 [ 1594.792825][T22106] ? lock_downgrade+0x920/0x920 [ 1594.792842][T22106] ? swp_swapcount+0x540/0x540 [ 1594.792858][T22106] ? __kasan_check_read+0x11/0x20 [ 1594.792869][T22106] ? do_raw_spin_unlock+0x57/0x270 [ 1594.792888][T22106] do_wp_page+0x543/0x15c0 [ 1594.792908][T22106] ? finish_mkwrite_fault+0x6a0/0x6a0 [ 1594.873667][T22106] __handle_mm_fault+0x23ec/0x4040 [ 1594.878790][T22106] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1594.884349][T22106] ? handle_mm_fault+0x292/0xaa0 [ 1594.889303][T22106] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1594.895550][T22106] ? __kasan_check_read+0x11/0x20 [ 1594.900580][T22106] handle_mm_fault+0x3b7/0xaa0 [ 1594.905353][T22106] __do_page_fault+0x536/0xdd0 [ 1594.910128][T22106] do_page_fault+0x38/0x590 [ 1594.914642][T22106] page_fault+0x39/0x40 [ 1594.918792][T22106] RIP: 0033:0x430b36 [ 1594.922684][T22106] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 44 64 00 85 c0 0f 84 [ 1594.942281][T22106] RSP: 002b:00007ffcf71d23e0 EFLAGS: 00010206 [ 1594.942293][T22106] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1594.942300][T22106] RDX: 0000000001184930 RSI: 000000000118c970 RDI: 0000000000000003 [ 1594.942307][T22106] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000001183940 [ 1594.942313][T22106] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1594.942320][T22106] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 [ 1594.996715][T22091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 00:13:10 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1595.008349][T22091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1595.025800][T22091] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1595.040362][T22091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1595.074687][T22091] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1595.096241][T22091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1595.123842][T22091] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1595.133523][T22091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1595.143658][T22091] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1595.155846][T22148] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1595.282182][T22106] memory: usage 932kB, limit 0kB, failcnt 874 [ 1595.289522][T22106] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1595.304425][T22106] Memory cgroup stats for /syz1: [ 1595.304553][T22106] anon 57344 [ 1595.304553][T22106] file 0 [ 1595.304553][T22106] kernel_stack 0 [ 1595.304553][T22106] slab 909312 [ 1595.304553][T22106] sock 0 [ 1595.304553][T22106] shmem 0 [ 1595.304553][T22106] file_mapped 0 [ 1595.304553][T22106] file_dirty 0 [ 1595.304553][T22106] file_writeback 0 [ 1595.304553][T22106] anon_thp 0 [ 1595.304553][T22106] inactive_anon 0 [ 1595.304553][T22106] active_anon 57344 [ 1595.304553][T22106] inactive_file 0 [ 1595.304553][T22106] active_file 0 [ 1595.304553][T22106] unevictable 0 [ 1595.304553][T22106] slab_reclaimable 270336 [ 1595.304553][T22106] slab_unreclaimable 638976 [ 1595.304553][T22106] pgfault 15444 [ 1595.304553][T22106] pgmajfault 0 [ 1595.304553][T22106] workingset_refault 0 [ 1595.304553][T22106] workingset_activate 0 [ 1595.304553][T22106] workingset_nodereclaim 0 [ 1595.304553][T22106] pgrefill 0 [ 1595.304553][T22106] pgscan 33 [ 1595.304553][T22106] pgsteal 0 [ 1595.304553][T22106] pgactivate 0 [ 1595.304553][T22106] pgdeactivate 0 [ 1595.403143][T22106] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=22106,uid=0 [ 1595.419132][T22106] Memory cgroup out of memory: Killed process 22106 (syz-executor.1) total-vm:72448kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 [ 1595.439280][ T1072] oom_reaper: reaped process 22106 (syz-executor.1), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 00:13:10 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r5, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r5, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r4, 0x0, 0x0) [ 1595.605080][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 00:13:11 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1596.162087][T22183] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1596.162551][T22148] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1596.269447][T22166] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1596.618230][T22206] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1596.653089][T22206] CPU: 0 PID: 22206 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 1596.661018][T22206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1596.671071][T22206] Call Trace: [ 1596.674394][T22206] dump_stack+0x172/0x1f0 [ 1596.678732][T22206] dump_header+0x10b/0x82d [ 1596.683153][T22206] oom_kill_process.cold+0x10/0x15 [ 1596.688265][T22206] out_of_memory+0x334/0x1340 [ 1596.692950][T22206] ? __sched_text_start+0x8/0x8 [ 1596.697805][T22206] ? oom_killer_disable+0x280/0x280 [ 1596.703019][T22206] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1596.708575][T22206] ? memcg_stat_show+0xc40/0xc40 [ 1596.713518][T22206] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1596.719337][T22206] ? cgroup_file_notify+0x140/0x1b0 [ 1596.724537][T22206] memory_max_write+0x262/0x3a0 [ 1596.729392][T22206] ? mem_cgroup_write+0x370/0x370 [ 1596.734424][T22206] cgroup_file_write+0x241/0x790 [ 1596.739354][T22206] ? mem_cgroup_write+0x370/0x370 [ 1596.744360][T22206] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1596.749974][T22206] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1596.755585][T22206] kernfs_fop_write+0x2b8/0x480 [ 1596.760415][T22206] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1596.766639][T22206] __vfs_write+0x8a/0x110 [ 1596.770952][T22206] ? kernfs_fop_open+0xd80/0xd80 [ 1596.776000][T22206] vfs_write+0x268/0x5d0 [ 1596.780240][T22206] ksys_write+0x14f/0x290 [ 1596.784549][T22206] ? __ia32_sys_read+0xb0/0xb0 [ 1596.789294][T22206] __x64_sys_write+0x73/0xb0 [ 1596.793926][T22206] do_syscall_64+0xfa/0x760 [ 1596.798466][T22206] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1596.804402][T22206] RIP: 0033:0x459a59 [ 1596.808279][T22206] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1596.827880][T22206] RSP: 002b:00007f334d232c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1596.836362][T22206] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 1596.845458][T22206] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1596.853439][T22206] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1596.861390][T22206] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f334d2336d4 [ 1596.869343][T22206] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 1597.361139][T22206] memory: usage 3244kB, limit 0kB, failcnt 703 [ 1597.367431][T22206] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1597.377475][T22206] Memory cgroup stats for /syz5: [ 1597.377589][T22206] anon 2150400 [ 1597.377589][T22206] file 12288 [ 1597.377589][T22206] kernel_stack 65536 [ 1597.377589][T22206] slab 937984 [ 1597.377589][T22206] sock 0 [ 1597.377589][T22206] shmem 0 [ 1597.377589][T22206] file_mapped 0 [ 1597.377589][T22206] file_dirty 0 [ 1597.377589][T22206] file_writeback 0 [ 1597.377589][T22206] anon_thp 2097152 [ 1597.377589][T22206] inactive_anon 0 [ 1597.377589][T22206] active_anon 2150400 [ 1597.377589][T22206] inactive_file 0 [ 1597.377589][T22206] active_file 0 [ 1597.377589][T22206] unevictable 0 [ 1597.377589][T22206] slab_reclaimable 135168 [ 1597.377589][T22206] slab_unreclaimable 802816 [ 1597.377589][T22206] pgfault 27819 [ 1597.377589][T22206] pgmajfault 0 [ 1597.377589][T22206] workingset_refault 0 [ 1597.377589][T22206] workingset_activate 0 [ 1597.377589][T22206] workingset_nodereclaim 0 [ 1597.377589][T22206] pgrefill 33 [ 1597.377589][T22206] pgscan 33 [ 1597.377589][T22206] pgsteal 0 [ 1597.377589][T22206] pgactivate 0 [ 1597.482579][T22206] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=22204,uid=0 00:13:12 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r6, 0x0, 0x0) 00:13:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r5, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r5, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r4, 0x0, 0x0) 00:13:12 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)=@isdn={0x22, 0x400, 0x100000000, 0x1f06, 0x1}, 0x80, &(0x7f0000000340)}, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0xcc539d13aa130b24, 0x0) write$cgroup_int(r6, 0x0, 0x0) [ 1597.512180][T22206] Memory cgroup out of memory: Killed process 22206 (syz-executor.5) total-vm:72580kB, anon-rss:2188kB, file-rss:35812kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 1597.531829][ T1072] oom_reaper: reaped process 22206 (syz-executor.5), now anon-rss:0kB, file-rss:34852kB, shmem-rss:0kB 00:13:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xfffff000, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:13:12 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:13:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x9effffff, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1597.608785][T22148] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1597.682140][T22148] CPU: 0 PID: 22148 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 1597.690076][T22148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1597.700137][T22148] Call Trace: [ 1597.703451][T22148] dump_stack+0x172/0x1f0 [ 1597.707794][T22148] dump_header+0x10b/0x82d [ 1597.712210][T22148] ? oom_kill_process+0x94/0x3f0 [ 1597.717151][T22148] oom_kill_process.cold+0x10/0x15 [ 1597.722285][T22148] out_of_memory+0x334/0x1340 [ 1597.726972][T22148] ? lock_downgrade+0x920/0x920 [ 1597.731829][T22148] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 1597.737639][T22148] ? oom_killer_disable+0x280/0x280 [ 1597.742859][T22148] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1597.748411][T22148] ? memcg_stat_show+0xc40/0xc40 [ 1597.753365][T22148] ? do_raw_spin_unlock+0x57/0x270 [ 1597.758487][T22148] ? _raw_spin_unlock+0x2d/0x50 [ 1597.763354][T22148] try_charge+0xf4b/0x1440 [ 1597.767790][T22148] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1597.773351][T22148] ? percpu_ref_tryget_live+0x111/0x290 [ 1597.778911][T22148] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1597.785159][T22148] ? __kasan_check_read+0x11/0x20 [ 1597.790201][T22148] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1597.795763][T22148] mem_cgroup_try_charge+0x136/0x590 [ 1597.801064][T22148] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1597.806720][T22148] wp_page_copy+0x407/0x1860 [ 1597.811474][T22148] ? find_held_lock+0x35/0x130 [ 1597.816249][T22148] ? do_wp_page+0x53b/0x15c0 [ 1597.820856][T22148] ? pmd_devmap_trans_unstable+0x220/0x220 [ 1597.826678][T22148] ? lock_downgrade+0x920/0x920 [ 1597.831543][T22148] ? swp_swapcount+0x540/0x540 [ 1597.836320][T22148] ? __kasan_check_read+0x11/0x20 [ 1597.841348][T22148] ? do_raw_spin_unlock+0x57/0x270 [ 1597.846470][T22148] do_wp_page+0x543/0x15c0 [ 1597.850900][T22148] ? finish_mkwrite_fault+0x6a0/0x6a0 [ 1597.856305][T22148] __handle_mm_fault+0x23ec/0x4040 [ 1597.861428][T22148] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1597.866976][T22148] ? handle_mm_fault+0x292/0xaa0 [ 1597.871928][T22148] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1597.878173][T22148] ? __kasan_check_read+0x11/0x20 [ 1597.883204][T22148] handle_mm_fault+0x3b7/0xaa0 [ 1597.887979][T22148] __do_page_fault+0x536/0xdd0 [ 1597.892760][T22148] do_page_fault+0x38/0x590 [ 1597.897296][T22148] page_fault+0x39/0x40 [ 1597.901452][T22148] RIP: 0033:0x430b36 [ 1597.905350][T22148] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 44 64 00 85 c0 0f 84 [ 1597.924959][T22148] RSP: 002b:00007ffd610bc890 EFLAGS: 00010206 [ 1597.931037][T22148] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1597.939024][T22148] RDX: 0000000000ebe930 RSI: 0000000000ec6970 RDI: 0000000000000003 [ 1597.947004][T22148] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000000ebd940 [ 1597.954986][T22148] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1597.962965][T22148] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 [ 1597.975674][T22148] memory: usage 884kB, limit 0kB, failcnt 711 [ 1597.981907][T22148] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1598.042222][T22148] Memory cgroup stats for /syz5: [ 1598.042349][T22148] anon 40960 [ 1598.042349][T22148] file 12288 [ 1598.042349][T22148] kernel_stack 65536 [ 1598.042349][T22148] slab 937984 [ 1598.042349][T22148] sock 0 [ 1598.042349][T22148] shmem 0 [ 1598.042349][T22148] file_mapped 0 [ 1598.042349][T22148] file_dirty 0 [ 1598.042349][T22148] file_writeback 0 [ 1598.042349][T22148] anon_thp 0 [ 1598.042349][T22148] inactive_anon 0 [ 1598.042349][T22148] active_anon 40960 [ 1598.042349][T22148] inactive_file 0 [ 1598.042349][T22148] active_file 0 [ 1598.042349][T22148] unevictable 0 [ 1598.042349][T22148] slab_reclaimable 135168 [ 1598.042349][T22148] slab_unreclaimable 802816 [ 1598.042349][T22148] pgfault 27852 [ 1598.042349][T22148] pgmajfault 0 [ 1598.042349][T22148] workingset_refault 0 [ 1598.042349][T22148] workingset_activate 0 [ 1598.042349][T22148] workingset_nodereclaim 0 [ 1598.042349][T22148] pgrefill 33 [ 1598.042349][T22148] pgscan 33 [ 1598.042349][T22148] pgsteal 0 [ 1598.042349][T22148] pgactivate 0 00:13:13 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1598.076127][T22215] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 00:13:13 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1598.300411][T22148] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=22148,uid=0 [ 1598.359999][T22148] Memory cgroup out of memory: Killed process 22148 (syz-executor.5) total-vm:72448kB, anon-rss:76kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 [ 1598.411832][ T1072] oom_reaper: reaped process 22148 (syz-executor.5), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 00:13:14 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x0, 0x3a) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r6, 0x0, 0x0) 00:13:14 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1598.918710][T22216] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 00:13:14 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x0, 0x3a) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r6, 0x0, 0x0) 00:13:14 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1599.083762][T22221] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1599.230830][T22213] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1599.258822][T22235] IPVS: ftp: loaded support on port[0] = 21 00:13:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1599.608250][T22245] IPVS: ftp: loaded support on port[0] = 21 [ 1599.617974][T22246] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1599.744821][T22235] chnl_net:caif_netlink_parms(): no params data found [ 1600.193514][T22235] bridge0: port 1(bridge_slave_0) entered blocking state [ 1600.200679][T22235] bridge0: port 1(bridge_slave_0) entered disabled state [ 1600.209560][T22235] device bridge_slave_0 entered promiscuous mode [ 1600.233527][T22235] bridge0: port 2(bridge_slave_1) entered blocking state [ 1600.240623][T22235] bridge0: port 2(bridge_slave_1) entered disabled state [ 1600.251725][T22235] device bridge_slave_1 entered promiscuous mode [ 1600.279175][T22245] chnl_net:caif_netlink_parms(): no params data found [ 1600.329105][T22235] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1600.374548][T22235] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1600.418902][T22235] team0: Port device team_slave_0 added [ 1600.449173][T22235] team0: Port device team_slave_1 added [ 1600.468716][T22245] bridge0: port 1(bridge_slave_0) entered blocking state [ 1600.492177][T22245] bridge0: port 1(bridge_slave_0) entered disabled state [ 1600.500733][T22245] device bridge_slave_0 entered promiscuous mode [ 1600.528286][T22245] bridge0: port 2(bridge_slave_1) entered blocking state [ 1600.546149][T22245] bridge0: port 2(bridge_slave_1) entered disabled state [ 1600.573693][T22245] device bridge_slave_1 entered promiscuous mode [ 1600.675753][T22235] device hsr_slave_0 entered promiscuous mode [ 1600.722962][T22235] device hsr_slave_1 entered promiscuous mode [ 1600.763078][T22235] debugfs: Directory 'hsr0' with parent '/' already present! [ 1600.776398][T22245] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1600.809750][T22254] IPVS: ftp: loaded support on port[0] = 21 [ 1600.825564][T22245] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1600.934017][T22245] team0: Port device team_slave_0 added [ 1600.941002][T22235] bridge0: port 2(bridge_slave_1) entered blocking state [ 1600.948164][T22235] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1600.955584][T22235] bridge0: port 1(bridge_slave_0) entered blocking state [ 1600.962703][T22235] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1600.978935][T22245] team0: Port device team_slave_1 added [ 1601.029868][T22087] bridge0: port 1(bridge_slave_0) entered disabled state [ 1601.043523][T22087] bridge0: port 2(bridge_slave_1) entered disabled state [ 1601.235453][T22245] device hsr_slave_0 entered promiscuous mode [ 1601.272789][T22245] device hsr_slave_1 entered promiscuous mode [ 1601.332072][T22245] debugfs: Directory 'hsr0' with parent '/' already present! [ 1601.348824][T22254] chnl_net:caif_netlink_parms(): no params data found [ 1601.475611][T22254] bridge0: port 1(bridge_slave_0) entered blocking state [ 1601.492282][T22254] bridge0: port 1(bridge_slave_0) entered disabled state [ 1601.500865][T22254] device bridge_slave_0 entered promiscuous mode [ 1601.535357][T22254] bridge0: port 2(bridge_slave_1) entered blocking state [ 1601.552157][T22254] bridge0: port 2(bridge_slave_1) entered disabled state [ 1601.562241][T22254] device bridge_slave_1 entered promiscuous mode [ 1601.636460][T22235] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1601.658810][T22254] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1601.701404][T22254] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1601.743014][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1601.753205][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1601.788974][T22235] 8021q: adding VLAN 0 to HW filter on device team0 [ 1601.804296][T22254] team0: Port device team_slave_0 added [ 1601.845097][T22254] team0: Port device team_slave_1 added [ 1601.857733][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1601.883116][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1601.891599][T18353] bridge0: port 1(bridge_slave_0) entered blocking state [ 1601.898712][T18353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1601.946843][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1601.963109][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1601.971698][ T2851] bridge0: port 2(bridge_slave_1) entered blocking state [ 1601.978819][ T2851] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1602.026935][T22245] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1602.054754][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1602.155788][T22254] device hsr_slave_0 entered promiscuous mode [ 1602.242863][T22254] device hsr_slave_1 entered promiscuous mode [ 1602.282126][T22254] debugfs: Directory 'hsr0' with parent '/' already present! [ 1602.294310][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1602.313019][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1602.352934][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1602.377388][T22245] 8021q: adding VLAN 0 to HW filter on device team0 [ 1602.426464][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1602.435946][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1602.453693][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1602.480233][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1602.493420][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1602.522211][T22091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1602.531095][T22091] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1602.552951][T22091] bridge0: port 1(bridge_slave_0) entered blocking state [ 1602.560029][T22091] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1602.585236][T22091] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1602.613121][T22091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1602.621930][T22091] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1602.645389][T22091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1602.654520][T22091] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1602.663364][T22091] bridge0: port 2(bridge_slave_1) entered blocking state [ 1602.670427][T22091] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1602.678558][T22091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1602.703240][T22091] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1602.735902][T22235] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1602.774303][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1602.824319][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1602.853605][T22091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1602.863558][T22091] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1602.872845][T22091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1602.882879][T22091] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1602.891900][T22091] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1602.926469][T22235] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1602.962365][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1602.971059][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1602.995023][T22254] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1603.013413][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1603.023123][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1603.045300][T22245] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1603.095010][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1603.103953][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1603.150191][T22245] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1603.177951][T22254] 8021q: adding VLAN 0 to HW filter on device team0 [ 1603.218493][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1603.253240][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1603.266649][T22087] bridge0: port 1(bridge_slave_0) entered blocking state [ 1603.273795][T22087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1603.303251][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1603.346799][T22091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1603.356248][T22091] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1603.382589][T22091] bridge0: port 2(bridge_slave_1) entered blocking state [ 1603.389763][T22091] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1603.445481][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1603.456326][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1603.493729][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1603.501094][T22265] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1603.503783][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1603.521746][T22265] CPU: 0 PID: 22265 Comm: syz-executor.1 Not tainted 5.4.0-rc1+ #0 [ 1603.529653][T22265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1603.539721][T22265] Call Trace: [ 1603.543023][T22265] dump_stack+0x172/0x1f0 [ 1603.547366][T22265] dump_header+0x10b/0x82d [ 1603.551793][T22265] oom_kill_process.cold+0x10/0x15 [ 1603.556900][T22265] out_of_memory+0x334/0x1340 [ 1603.556916][T22265] ? __sched_text_start+0x8/0x8 [ 1603.556931][T22265] ? oom_killer_disable+0x280/0x280 [ 1603.556956][T22265] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1603.556973][T22265] ? memcg_stat_show+0xc40/0xc40 [ 1603.582100][T22265] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1603.585673][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1603.587919][T22265] ? cgroup_file_notify+0x140/0x1b0 [ 1603.600981][T22265] memory_max_write+0x262/0x3a0 [ 1603.605842][T22265] ? mem_cgroup_write+0x370/0x370 [ 1603.610870][T22265] ? cgroup_file_write+0x86/0x790 [ 1603.615984][T22265] cgroup_file_write+0x241/0x790 [ 1603.620924][T22265] ? mem_cgroup_write+0x370/0x370 [ 1603.623299][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1603.625955][T22265] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1603.639357][T22265] ? kernfs_ops+0x9f/0x120 [ 1603.643775][T22265] ? kernfs_ops+0xbe/0x120 [ 1603.648194][T22265] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1603.653833][T22265] kernfs_fop_write+0x2b8/0x480 [ 1603.658736][T22265] __vfs_write+0x8a/0x110 [ 1603.663071][T22265] ? kernfs_fop_open+0xd80/0xd80 [ 1603.668017][T22265] vfs_write+0x268/0x5d0 [ 1603.672261][T22265] ksys_write+0x14f/0x290 [ 1603.674532][T22254] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1603.676591][T22265] ? __ia32_sys_read+0xb0/0xb0 [ 1603.691641][T22265] ? do_syscall_64+0x26/0x760 [ 1603.696319][T22265] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1603.702642][T22265] ? do_syscall_64+0x26/0x760 [ 1603.707321][T22265] __x64_sys_write+0x73/0xb0 [ 1603.711911][T22265] do_syscall_64+0xfa/0x760 [ 1603.711998][T22254] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1603.716421][T22265] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1603.732591][T22265] RIP: 0033:0x459a59 [ 1603.736488][T22265] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1603.756265][T22265] RSP: 002b:00007fc611411c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1603.764684][T22265] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 1603.772660][T22265] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1603.780637][T22265] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1603.788615][T22265] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc6114126d4 [ 1603.797380][T22265] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 1603.803611][T22254] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1603.840065][T22265] memory: usage 3360kB, limit 0kB, failcnt 875 [ 1603.866519][T22265] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1603.884257][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1603.898165][T22265] Memory cgroup stats for /syz1: [ 1603.899680][T22265] anon 2183168 [ 1603.899680][T22265] file 0 [ 1603.899680][T22265] kernel_stack 65536 [ 1603.899680][T22265] slab 909312 [ 1603.899680][T22265] sock 0 [ 1603.899680][T22265] shmem 0 [ 1603.899680][T22265] file_mapped 0 [ 1603.899680][T22265] file_dirty 0 [ 1603.899680][T22265] file_writeback 0 [ 1603.899680][T22265] anon_thp 2097152 [ 1603.899680][T22265] inactive_anon 0 [ 1603.899680][T22265] active_anon 2183168 [ 1603.899680][T22265] inactive_file 0 [ 1603.899680][T22265] active_file 0 [ 1603.899680][T22265] unevictable 0 [ 1603.899680][T22265] slab_reclaimable 270336 [ 1603.899680][T22265] slab_unreclaimable 638976 [ 1603.899680][T22265] pgfault 15510 [ 1603.899680][T22265] pgmajfault 0 [ 1603.899680][T22265] workingset_refault 0 [ 1603.899680][T22265] workingset_activate 0 [ 1603.899680][T22265] workingset_nodereclaim 0 [ 1603.899680][T22265] pgrefill 0 [ 1603.899680][T22265] pgscan 33 [ 1603.899680][T22265] pgsteal 0 [ 1603.899680][T22265] pgactivate 0 [ 1603.901686][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1603.928066][T22265] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=22263,uid=0 [ 1604.102175][T22265] Memory cgroup out of memory: Killed process 22263 (syz-executor.1) total-vm:72712kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 1604.122407][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1604.142494][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1604.142948][T22271] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1604.152677][ T1072] oom_reaper: reaped process 22263 (syz-executor.1), now anon-rss:0kB, file-rss:33856kB, shmem-rss:0kB [ 1604.168922][T22271] CPU: 0 PID: 22271 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 1604.179605][T22271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1604.183018][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1604.189664][T22271] Call Trace: [ 1604.200654][T22271] dump_stack+0x172/0x1f0 [ 1604.204990][T22271] dump_header+0x10b/0x82d [ 1604.209408][T22271] oom_kill_process.cold+0x10/0x15 [ 1604.213337][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1604.214610][T22271] out_of_memory+0x334/0x1340 [ 1604.226390][T22271] ? retint_kernel+0x2b/0x2b [ 1604.230991][T22271] ? oom_killer_disable+0x280/0x280 [ 1604.236553][T22271] ? mem_cgroup_out_of_memory+0x16a/0x240 [ 1604.242296][T22271] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1604.247850][T22271] ? memcg_stat_show+0xc40/0xc40 [ 1604.252809][T22271] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1604.258618][T22271] ? cgroup_file_notify+0x140/0x1b0 [ 1604.263839][T22271] memory_max_write+0x262/0x3a0 [ 1604.268697][T22271] ? mem_cgroup_write+0x370/0x370 [ 1604.273727][T22271] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1604.279202][T22271] cgroup_file_write+0x241/0x790 [ 1604.284150][T22271] ? mem_cgroup_write+0x370/0x370 [ 1604.289174][T22271] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1604.294824][T22271] ? cgroup_file_write+0xe/0x790 [ 1604.299766][T22271] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1604.305403][T22271] kernfs_fop_write+0x2b8/0x480 [ 1604.310347][T22271] __vfs_write+0x8a/0x110 [ 1604.314690][T22271] ? kernfs_fop_open+0xd80/0xd80 [ 1604.319712][T22271] vfs_write+0x268/0x5d0 [ 1604.323957][T22271] ksys_write+0x14f/0x290 [ 1604.328286][T22271] ? __ia32_sys_read+0xb0/0xb0 [ 1604.333048][T22271] ? do_syscall_64+0x26/0x760 [ 1604.337811][T22271] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1604.343876][T22271] ? do_syscall_64+0x26/0x760 [ 1604.348556][T22271] __x64_sys_write+0x73/0xb0 [ 1604.353153][T22271] do_syscall_64+0xfa/0x760 [ 1604.357667][T22271] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1604.363580][T22271] RIP: 0033:0x459a59 [ 1604.367474][T22271] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1604.387163][T22271] RSP: 002b:00007f969d817c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1604.403041][T22271] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 1604.411008][T22271] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1604.418978][T22271] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1604.426952][T22271] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f969d8186d4 [ 1604.434922][T22271] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 1604.455372][T22271] memory: usage 3148kB, limit 0kB, failcnt 367 [ 1604.472987][T22271] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1604.512109][T22271] Memory cgroup stats for /syz4: [ 1604.513376][T22271] anon 2129920 [ 1604.513376][T22271] file 40960 [ 1604.513376][T22271] kernel_stack 65536 [ 1604.513376][T22271] slab 831488 [ 1604.513376][T22271] sock 0 [ 1604.513376][T22271] shmem 0 [ 1604.513376][T22271] file_mapped 0 [ 1604.513376][T22271] file_dirty 0 [ 1604.513376][T22271] file_writeback 0 [ 1604.513376][T22271] anon_thp 2097152 [ 1604.513376][T22271] inactive_anon 0 [ 1604.513376][T22271] active_anon 2129920 [ 1604.513376][T22271] inactive_file 131072 [ 1604.513376][T22271] active_file 0 [ 1604.513376][T22271] unevictable 0 [ 1604.513376][T22271] slab_reclaimable 270336 [ 1604.513376][T22271] slab_unreclaimable 561152 [ 1604.513376][T22271] pgfault 37389 [ 1604.513376][T22271] pgmajfault 0 [ 1604.513376][T22271] workingset_refault 0 [ 1604.513376][T22271] workingset_activate 0 [ 1604.513376][T22271] workingset_nodereclaim 0 [ 1604.513376][T22271] pgrefill 69 [ 1604.513376][T22271] pgscan 5378 [ 1604.513376][T22271] pgsteal 5230 [ 1604.513376][T22271] pgactivate 99 [ 1604.662217][T22271] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=22269,uid=0 [ 1604.742678][T22271] Memory cgroup out of memory: Killed process 22271 (syz-executor.4) total-vm:72580kB, anon-rss:2180kB, file-rss:35808kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 1604.822293][T22235] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1604.823716][ T1072] oom_reaper: reaped process 22271 (syz-executor.4), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB [ 1604.842085][T22235] CPU: 0 PID: 22235 Comm: syz-executor.1 Not tainted 5.4.0-rc1+ #0 [ 1604.851282][T22235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1604.861339][T22235] Call Trace: [ 1604.864637][T22235] dump_stack+0x172/0x1f0 [ 1604.868973][T22235] dump_header+0x10b/0x82d [ 1604.873393][T22235] ? oom_kill_process+0x94/0x3f0 [ 1604.878330][T22235] oom_kill_process.cold+0x10/0x15 [ 1604.883447][T22235] out_of_memory+0x334/0x1340 [ 1604.888124][T22235] ? lock_downgrade+0x920/0x920 [ 1604.892982][T22235] ? oom_killer_disable+0x280/0x280 [ 1604.899406][T22235] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1604.904946][T22235] ? memcg_stat_show+0xc40/0xc40 [ 1604.909971][T22235] ? do_raw_spin_unlock+0x57/0x270 [ 1604.915080][T22235] ? _raw_spin_unlock+0x2d/0x50 [ 1604.919939][T22235] try_charge+0xf4b/0x1440 [ 1604.924366][T22235] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1604.929909][T22235] ? percpu_ref_tryget_live+0x111/0x290 [ 1604.935455][T22235] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1604.941715][T22235] ? __kasan_check_read+0x11/0x20 [ 1604.946756][T22235] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1604.952317][T22235] mem_cgroup_try_charge+0x136/0x590 [ 1604.957612][T22235] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1604.963251][T22235] wp_page_copy+0x407/0x1860 [ 1604.967839][T22235] ? find_held_lock+0x35/0x130 [ 1604.972600][T22235] ? do_wp_page+0x53b/0x15c0 [ 1604.977193][T22235] ? pmd_devmap_trans_unstable+0x220/0x220 [ 1604.983018][T22235] ? lock_downgrade+0x920/0x920 [ 1604.987874][T22235] ? swp_swapcount+0x540/0x540 [ 1604.992666][T22235] ? __kasan_check_read+0x11/0x20 [ 1604.997692][T22235] ? do_raw_spin_unlock+0x57/0x270 [ 1605.002896][T22235] do_wp_page+0x543/0x15c0 [ 1605.007317][T22235] ? finish_mkwrite_fault+0x6a0/0x6a0 [ 1605.012699][T22235] __handle_mm_fault+0x23ec/0x4040 [ 1605.017820][T22235] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1605.023380][T22235] ? handle_mm_fault+0x292/0xaa0 [ 1605.028415][T22235] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1605.034661][T22235] ? __kasan_check_read+0x11/0x20 [ 1605.039782][T22235] handle_mm_fault+0x3b7/0xaa0 [ 1605.044549][T22235] __do_page_fault+0x536/0xdd0 [ 1605.049321][T22235] do_page_fault+0x38/0x590 [ 1605.053830][T22235] page_fault+0x39/0x40 [ 1605.057978][T22235] RIP: 0033:0x403522 [ 1605.061879][T22235] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 59 8f 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 79 44 05 00 48 [ 1605.081478][T22235] RSP: 002b:00007ffc58ba1d70 EFLAGS: 00010246 [ 1605.087538][T22235] RAX: 0000000000000000 RBX: 00000000001879d6 RCX: 0000000000413660 [ 1605.095517][T22235] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffc58ba2ea0 [ 1605.103481][T22235] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000000001561940 [ 1605.111462][T22235] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc58ba2ea0 [ 1605.119429][T22235] R13: 00007ffc58ba2e90 R14: 0000000000000000 R15: 00007ffc58ba2ea0 00:13:20 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r5, 0x0, 0x0) 00:13:20 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:13:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xf0ffffff, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) 00:13:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xffffff9e, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:13:20 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)=@isdn={0x22, 0x400, 0x100000000, 0x1f06, 0x1}, 0x80, &(0x7f0000000340)}, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r6, 0x0, 0x0) [ 1605.147230][T22235] memory: usage 988kB, limit 0kB, failcnt 887 [ 1605.185222][T22235] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1605.212785][T22235] Memory cgroup stats for /syz1: [ 1605.212896][T22235] anon 32768 [ 1605.212896][T22235] file 0 [ 1605.212896][T22235] kernel_stack 0 [ 1605.212896][T22235] slab 909312 [ 1605.212896][T22235] sock 0 [ 1605.212896][T22235] shmem 0 [ 1605.212896][T22235] file_mapped 0 [ 1605.212896][T22235] file_dirty 0 [ 1605.212896][T22235] file_writeback 0 [ 1605.212896][T22235] anon_thp 0 [ 1605.212896][T22235] inactive_anon 0 [ 1605.212896][T22235] active_anon 32768 [ 1605.212896][T22235] inactive_file 0 [ 1605.212896][T22235] active_file 0 [ 1605.212896][T22235] unevictable 0 [ 1605.212896][T22235] slab_reclaimable 270336 [ 1605.212896][T22235] slab_unreclaimable 638976 [ 1605.212896][T22235] pgfault 15510 [ 1605.212896][T22235] pgmajfault 0 [ 1605.212896][T22235] workingset_refault 0 [ 1605.212896][T22235] workingset_activate 0 [ 1605.212896][T22235] workingset_nodereclaim 0 [ 1605.212896][T22235] pgrefill 0 [ 1605.212896][T22235] pgscan 33 [ 1605.212896][T22235] pgsteal 0 [ 1605.212896][T22235] pgactivate 0 [ 1605.212896][T22235] pgdeactivate 0 00:13:20 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1605.254245][T22289] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1605.412118][T22235] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=22235,uid=0 00:13:20 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1605.461489][T22235] Memory cgroup out of memory: Killed process 22235 (syz-executor.1) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 [ 1605.543722][ T1072] oom_reaper: reaped process 22235 (syz-executor.1), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 1605.557222][T22281] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1605.592480][T22281] CPU: 1 PID: 22281 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 1605.600408][T22281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1605.610471][T22281] Call Trace: [ 1605.613778][T22281] dump_stack+0x172/0x1f0 [ 1605.618121][T22281] dump_header+0x10b/0x82d [ 1605.622552][T22281] oom_kill_process.cold+0x10/0x15 [ 1605.627670][T22281] out_of_memory+0x334/0x1340 [ 1605.632453][T22281] ? cgroup_file_notify+0x140/0x1b0 [ 1605.637659][T22281] ? oom_killer_disable+0x280/0x280 [ 1605.642869][T22281] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1605.648412][T22281] ? memcg_stat_show+0xc40/0xc40 [ 1605.653361][T22281] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1605.659173][T22281] ? cgroup_file_notify+0x140/0x1b0 [ 1605.664380][T22281] memory_max_write+0x262/0x3a0 [ 1605.669238][T22281] ? mem_cgroup_write+0x370/0x370 [ 1605.674265][T22281] ? lock_acquire+0x190/0x410 [ 1605.678940][T22281] ? kernfs_fop_write+0x227/0x480 [ 1605.683984][T22281] cgroup_file_write+0x241/0x790 [ 1605.692050][T22281] ? mem_cgroup_write+0x370/0x370 [ 1605.692070][T22281] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1605.692101][T22281] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1605.692117][T22281] kernfs_fop_write+0x2b8/0x480 [ 1605.692134][T22281] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1605.692153][T22281] __vfs_write+0x8a/0x110 [ 1605.692166][T22281] ? kernfs_fop_open+0xd80/0xd80 [ 1605.692184][T22281] vfs_write+0x268/0x5d0 [ 1605.692204][T22281] ksys_write+0x14f/0x290 [ 1605.692221][T22281] ? __ia32_sys_read+0xb0/0xb0 [ 1605.692239][T22281] ? do_syscall_64+0x26/0x760 [ 1605.692255][T22281] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1605.692269][T22281] ? do_syscall_64+0x26/0x760 [ 1605.692290][T22281] __x64_sys_write+0x73/0xb0 [ 1605.692309][T22281] do_syscall_64+0xfa/0x760 [ 1605.692329][T22281] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1605.692344][T22281] RIP: 0033:0x459a59 [ 1605.708581][T22281] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1605.708590][T22281] RSP: 002b:00007ff66eb55c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1605.708605][T22281] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 1605.708613][T22281] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1605.708622][T22281] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1605.708631][T22281] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff66eb566d4 [ 1605.708640][T22281] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 1605.887238][T22281] memory: usage 3260kB, limit 0kB, failcnt 712 [ 1605.893633][T22281] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1605.912284][T22281] Memory cgroup stats for /syz5: [ 1605.912393][T22281] anon 2150400 [ 1605.912393][T22281] file 12288 [ 1605.912393][T22281] kernel_stack 65536 [ 1605.912393][T22281] slab 937984 [ 1605.912393][T22281] sock 0 [ 1605.912393][T22281] shmem 0 [ 1605.912393][T22281] file_mapped 0 [ 1605.912393][T22281] file_dirty 0 [ 1605.912393][T22281] file_writeback 0 [ 1605.912393][T22281] anon_thp 2097152 [ 1605.912393][T22281] inactive_anon 0 [ 1605.912393][T22281] active_anon 2150400 [ 1605.912393][T22281] inactive_file 0 00:13:21 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1605.912393][T22281] active_file 0 [ 1605.912393][T22281] unevictable 0 [ 1605.912393][T22281] slab_reclaimable 135168 [ 1605.912393][T22281] slab_unreclaimable 802816 [ 1605.912393][T22281] pgfault 27918 [ 1605.912393][T22281] pgmajfault 0 [ 1605.912393][T22281] workingset_refault 0 [ 1605.912393][T22281] workingset_activate 0 [ 1605.912393][T22281] workingset_nodereclaim 0 [ 1605.912393][T22281] pgrefill 33 [ 1605.912393][T22281] pgscan 33 [ 1605.912393][T22281] pgsteal 0 [ 1605.912393][T22281] pgactivate 0 [ 1606.017595][T22281] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=22277,uid=0 [ 1606.066246][T22281] Memory cgroup out of memory: Killed process 22281 (syz-executor.5) total-vm:72712kB, anon-rss:2188kB, file-rss:35800kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:1000 [ 1606.084931][T22245] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1606.089463][ T1072] oom_reaper: reaped process 22281 (syz-executor.5), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB [ 1606.095657][T22245] CPU: 0 PID: 22245 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 1606.113907][T22245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1606.123960][T22245] Call Trace: [ 1606.127251][T22245] dump_stack+0x172/0x1f0 [ 1606.131582][T22245] dump_header+0x10b/0x82d [ 1606.135992][T22245] ? oom_kill_process+0x94/0x3f0 [ 1606.140931][T22245] oom_kill_process.cold+0x10/0x15 [ 1606.146045][T22245] out_of_memory+0x334/0x1340 [ 1606.150728][T22245] ? lock_downgrade+0x920/0x920 [ 1606.155584][T22245] ? oom_killer_disable+0x280/0x280 [ 1606.160793][T22245] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1606.166339][T22245] ? memcg_stat_show+0xc40/0xc40 [ 1606.171282][T22245] ? do_raw_spin_unlock+0x57/0x270 [ 1606.176395][T22245] ? _raw_spin_unlock+0x2d/0x50 [ 1606.181249][T22245] try_charge+0xf4b/0x1440 [ 1606.185695][T22245] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1606.191233][T22245] ? percpu_ref_tryget_live+0x111/0x290 [ 1606.196787][T22245] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1606.203120][T22245] ? __kasan_check_read+0x11/0x20 [ 1606.208147][T22245] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1606.213691][T22245] mem_cgroup_try_charge+0x136/0x590 [ 1606.218978][T22245] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1606.224625][T22245] wp_page_copy+0x407/0x1860 [ 1606.229211][T22245] ? find_held_lock+0x35/0x130 [ 1606.233972][T22245] ? do_wp_page+0x53b/0x15c0 [ 1606.238565][T22245] ? pmd_devmap_trans_unstable+0x220/0x220 [ 1606.244369][T22245] ? lock_downgrade+0x920/0x920 [ 1606.249260][T22245] ? swp_swapcount+0x540/0x540 [ 1606.254043][T22245] ? __kasan_check_read+0x11/0x20 [ 1606.259075][T22245] ? do_raw_spin_unlock+0x57/0x270 [ 1606.264187][T22245] do_wp_page+0x543/0x15c0 [ 1606.268603][T22245] ? finish_mkwrite_fault+0x6a0/0x6a0 [ 1606.274061][T22245] __handle_mm_fault+0x23ec/0x4040 [ 1606.279182][T22245] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1606.284728][T22245] ? handle_mm_fault+0x292/0xaa0 [ 1606.289678][T22245] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1606.295922][T22245] ? __kasan_check_read+0x11/0x20 [ 1606.300949][T22245] handle_mm_fault+0x3b7/0xaa0 [ 1606.305716][T22245] __do_page_fault+0x536/0xdd0 [ 1606.310482][T22245] do_page_fault+0x38/0x590 [ 1606.314995][T22245] page_fault+0x39/0x40 [ 1606.319145][T22245] RIP: 0033:0x430b36 [ 1606.323065][T22245] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 44 64 00 85 c0 0f 84 [ 1606.342666][T22245] RSP: 002b:00007ffc6e0bc120 EFLAGS: 00010206 [ 1606.348724][T22245] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1606.356686][T22245] RDX: 0000000002864930 RSI: 000000000286c970 RDI: 0000000000000003 00:13:21 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x0, 0x3a) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r6, 0x0, 0x0) [ 1606.364649][T22245] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002863940 [ 1606.372616][T22245] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1606.380577][T22245] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 [ 1606.450296][T22245] memory: usage 824kB, limit 0kB, failcnt 375 [ 1606.456933][T22245] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1606.467584][T22245] Memory cgroup stats for /syz4: [ 1606.467697][T22245] anon 0 [ 1606.467697][T22245] file 40960 [ 1606.467697][T22245] kernel_stack 0 [ 1606.467697][T22245] slab 831488 [ 1606.467697][T22245] sock 0 [ 1606.467697][T22245] shmem 0 [ 1606.467697][T22245] file_mapped 0 [ 1606.467697][T22245] file_dirty 0 [ 1606.467697][T22245] file_writeback 0 [ 1606.467697][T22245] anon_thp 0 [ 1606.467697][T22245] inactive_anon 0 [ 1606.467697][T22245] active_anon 0 [ 1606.467697][T22245] inactive_file 131072 [ 1606.467697][T22245] active_file 0 [ 1606.467697][T22245] unevictable 0 [ 1606.467697][T22245] slab_reclaimable 270336 [ 1606.467697][T22245] slab_unreclaimable 561152 [ 1606.467697][T22245] pgfault 37389 [ 1606.467697][T22245] pgmajfault 0 [ 1606.467697][T22245] workingset_refault 0 [ 1606.467697][T22245] workingset_activate 0 [ 1606.467697][T22245] workingset_nodereclaim 0 [ 1606.467697][T22245] pgrefill 69 [ 1606.467697][T22245] pgscan 5378 [ 1606.467697][T22245] pgsteal 5230 [ 1606.467697][T22245] pgactivate 99 [ 1606.565005][T22245] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=22245,uid=0 [ 1606.581201][T22245] Memory cgroup out of memory: Killed process 22245 (syz-executor.4) total-vm:72448kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 [ 1606.599090][T22254] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1606.599600][ T1072] oom_reaper: reaped process 22245 (syz-executor.4), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 1606.609581][T22254] CPU: 0 PID: 22254 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 1606.628634][T22254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1606.638689][T22254] Call Trace: [ 1606.641989][T22254] dump_stack+0x172/0x1f0 [ 1606.646322][T22254] dump_header+0x10b/0x82d [ 1606.650737][T22254] ? oom_kill_process+0x94/0x3f0 [ 1606.655676][T22254] oom_kill_process.cold+0x10/0x15 [ 1606.660812][T22254] out_of_memory+0x334/0x1340 [ 1606.665488][T22254] ? lock_downgrade+0x920/0x920 [ 1606.670344][T22254] ? oom_killer_disable+0x280/0x280 [ 1606.675550][T22254] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1606.681096][T22254] ? memcg_stat_show+0xc40/0xc40 [ 1606.686035][T22254] ? do_raw_spin_unlock+0x57/0x270 [ 1606.691148][T22254] ? _raw_spin_unlock+0x2d/0x50 [ 1606.695998][T22254] try_charge+0xf4b/0x1440 [ 1606.700420][T22254] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1606.705970][T22254] ? percpu_ref_tryget_live+0x111/0x290 [ 1606.711519][T22254] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1606.717756][T22254] ? __kasan_check_read+0x11/0x20 [ 1606.722783][T22254] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1606.728330][T22254] mem_cgroup_try_charge+0x136/0x590 [ 1606.733621][T22254] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1606.739255][T22254] wp_page_copy+0x407/0x1860 [ 1606.743843][T22254] ? find_held_lock+0x35/0x130 [ 1606.748606][T22254] ? do_wp_page+0x53b/0x15c0 [ 1606.753199][T22254] ? pmd_devmap_trans_unstable+0x220/0x220 [ 1606.759007][T22254] ? lock_downgrade+0x920/0x920 [ 1606.763857][T22254] ? swp_swapcount+0x540/0x540 [ 1606.768619][T22254] ? __kasan_check_read+0x11/0x20 [ 1606.773649][T22254] ? do_raw_spin_unlock+0x57/0x270 [ 1606.778761][T22254] do_wp_page+0x543/0x15c0 [ 1606.783191][T22254] ? finish_mkwrite_fault+0x6a0/0x6a0 [ 1606.788571][T22254] __handle_mm_fault+0x23ec/0x4040 [ 1606.793689][T22254] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1606.799236][T22254] ? handle_mm_fault+0x292/0xaa0 [ 1606.804183][T22254] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1606.810422][T22254] ? __kasan_check_read+0x11/0x20 [ 1606.815460][T22254] handle_mm_fault+0x3b7/0xaa0 [ 1606.820232][T22254] __do_page_fault+0x536/0xdd0 [ 1606.825094][T22254] do_page_fault+0x38/0x590 [ 1606.829609][T22254] page_fault+0x39/0x40 [ 1606.833771][T22254] RIP: 0033:0x430b36 [ 1606.837668][T22254] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 44 64 00 85 c0 0f 84 [ 1606.857358][T22254] RSP: 002b:00007ffec3efa530 EFLAGS: 00010206 [ 1606.863424][T22254] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1606.871395][T22254] RDX: 0000000000af2930 RSI: 0000000000afa970 RDI: 0000000000000003 [ 1606.879361][T22254] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000000af1940 [ 1606.887324][T22254] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 00:13:22 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)=@isdn={0x22, 0x400, 0x100000000, 0x1f06, 0x1}, 0x80, &(0x7f0000000340)}, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r6, 0x0, 0x0) [ 1606.895289][T22254] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 [ 1606.921909][T22254] memory: usage 956kB, limit 0kB, failcnt 720 [ 1606.929200][T22254] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1606.933427][T22290] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1606.977704][T22254] Memory cgroup stats for /syz5: [ 1606.977817][T22254] anon 0 [ 1606.977817][T22254] file 12288 [ 1606.977817][T22254] kernel_stack 65536 [ 1606.977817][T22254] slab 937984 [ 1606.977817][T22254] sock 0 [ 1606.977817][T22254] shmem 0 [ 1606.977817][T22254] file_mapped 0 [ 1606.977817][T22254] file_dirty 0 [ 1606.977817][T22254] file_writeback 0 [ 1606.977817][T22254] anon_thp 0 [ 1606.977817][T22254] inactive_anon 0 [ 1606.977817][T22254] active_anon 0 [ 1606.977817][T22254] inactive_file 0 [ 1606.977817][T22254] active_file 0 [ 1606.977817][T22254] unevictable 0 [ 1606.977817][T22254] slab_reclaimable 135168 [ 1606.977817][T22254] slab_unreclaimable 802816 [ 1606.977817][T22254] pgfault 27918 [ 1606.977817][T22254] pgmajfault 0 [ 1606.977817][T22254] workingset_refault 0 [ 1606.977817][T22254] workingset_activate 0 [ 1606.977817][T22254] workingset_nodereclaim 0 [ 1606.977817][T22254] pgrefill 33 [ 1606.977817][T22254] pgscan 33 [ 1606.977817][T22254] pgsteal 0 [ 1606.977817][T22254] pgactivate 0 [ 1606.977817][T22254] pgdeactivate 33 00:13:22 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1607.003840][T22254] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=22254,uid=0 00:13:22 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)=@isdn={0x22, 0x400, 0x100000000, 0x1f06, 0x1}, 0x80, &(0x7f0000000340)}, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r6, 0x0, 0x0) [ 1607.512683][T22254] Memory cgroup out of memory: Killed process 22254 (syz-executor.5) total-vm:72448kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:118784kB oom_score_adj:0 [ 1607.546474][ T1072] oom_reaper: reaped process 22254 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 00:13:22 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r5, 0x0, 0x0) 00:13:22 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1607.586401][T22287] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 00:13:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xfffff000, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1608.150269][T22306] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 00:13:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xfffffff0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:13:23 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 1608.292241][T22321] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 00:13:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r6, 0x0, 0x0) 00:13:23 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:13:23 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1608.556266][T22330] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 00:13:24 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1608.967993][T22339] IPVS: ftp: loaded support on port[0] = 21 [ 1609.097958][T22335] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 00:13:24 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:13:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1609.302052][T22344] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1609.460274][T22339] chnl_net:caif_netlink_parms(): no params data found [ 1609.484030][T22353] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1609.619463][T22339] bridge0: port 1(bridge_slave_0) entered blocking state [ 1609.628439][T22339] bridge0: port 1(bridge_slave_0) entered disabled state [ 1609.637303][T22339] device bridge_slave_0 entered promiscuous mode [ 1609.674370][T22339] bridge0: port 2(bridge_slave_1) entered blocking state [ 1609.685261][T22339] bridge0: port 2(bridge_slave_1) entered disabled state [ 1609.716545][T22339] device bridge_slave_1 entered promiscuous mode [ 1609.740805][T22353] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1609.837886][T22339] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1609.875977][T22339] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1610.004934][T22339] team0: Port device team_slave_0 added [ 1610.023336][T22339] team0: Port device team_slave_1 added [ 1610.037523][T22377] IPVS: ftp: loaded support on port[0] = 21 [ 1610.105394][T22339] device hsr_slave_0 entered promiscuous mode [ 1610.154540][T22339] device hsr_slave_1 entered promiscuous mode [ 1610.202191][T22339] debugfs: Directory 'hsr0' with parent '/' already present! [ 1610.219747][T22379] IPVS: ftp: loaded support on port[0] = 21 [ 1610.390213][T22339] bridge0: port 2(bridge_slave_1) entered blocking state [ 1610.397327][T22339] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1610.404662][T22339] bridge0: port 1(bridge_slave_0) entered blocking state [ 1610.411696][T22339] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1610.505560][T22093] bridge0: port 1(bridge_slave_0) entered disabled state [ 1610.513880][T22093] bridge0: port 2(bridge_slave_1) entered disabled state [ 1610.540671][T22377] chnl_net:caif_netlink_parms(): no params data found [ 1610.619747][T22377] bridge0: port 1(bridge_slave_0) entered blocking state [ 1610.628506][T22377] bridge0: port 1(bridge_slave_0) entered disabled state [ 1610.637075][T22377] device bridge_slave_0 entered promiscuous mode [ 1610.679622][T22377] bridge0: port 2(bridge_slave_1) entered blocking state [ 1610.688004][T22377] bridge0: port 2(bridge_slave_1) entered disabled state [ 1610.696806][T22377] device bridge_slave_1 entered promiscuous mode [ 1621.570242][T22339] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1621.578464][T22379] chnl_net:caif_netlink_parms(): no params data found [ 1621.592537][T22377] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1626.973067][T22377] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1627.029847][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1627.040802][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1627.051276][T22339] 8021q: adding VLAN 0 to HW filter on device team0 [ 1632.504830][T22379] bridge0: port 1(bridge_slave_0) entered blocking state [ 1632.515852][T22379] bridge0: port 1(bridge_slave_0) entered disabled state [ 1632.524593][T22379] device bridge_slave_0 entered promiscuous mode [ 1632.534967][T22379] bridge0: port 2(bridge_slave_1) entered blocking state [ 1632.542645][T22379] bridge0: port 2(bridge_slave_1) entered disabled state [ 1632.551000][T22379] device bridge_slave_1 entered promiscuous mode [ 1632.560852][T22377] team0: Port device team_slave_0 added [ 1632.574372][T22377] team0: Port device team_slave_1 added [ 1638.007075][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1638.022987][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1638.031504][T22357] bridge0: port 1(bridge_slave_0) entered blocking state [ 1638.038809][T22357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1638.048108][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1638.057695][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1638.066773][T22357] bridge0: port 2(bridge_slave_1) entered blocking state [ 1638.073892][T22357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1638.117647][T22379] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1638.127978][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1638.137343][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1638.175806][T22377] device hsr_slave_0 entered promiscuous mode [ 1638.234118][T22377] device hsr_slave_1 entered promiscuous mode [ 1638.302214][T22377] debugfs: Directory 'hsr0' with parent '/' already present! [ 1638.312765][T22379] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1638.335580][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1638.344933][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1638.354191][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1638.367251][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1638.376762][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1638.385825][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1643.770797][T22339] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1643.784578][T22339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1643.812532][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1643.821191][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1643.831538][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1649.295378][T22379] team0: Port device team_slave_0 added [ 1649.314091][T22339] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1649.345382][T22379] team0: Port device team_slave_1 added [ 1654.955504][T22379] device hsr_slave_0 entered promiscuous mode [ 1655.072836][T22379] device hsr_slave_1 entered promiscuous mode [ 1655.192215][T22379] debugfs: Directory 'hsr0' with parent '/' already present! [ 1660.556341][T22377] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1660.588079][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1660.608363][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1660.644803][T22377] 8021q: adding VLAN 0 to HW filter on device team0 [ 1660.784893][T22388] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1660.812085][T22388] CPU: 1 PID: 22388 Comm: syz-executor.1 Not tainted 5.4.0-rc1+ #0 [ 1660.820014][T22388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1660.830076][T22388] Call Trace: [ 1660.833378][T22388] dump_stack+0x172/0x1f0 [ 1660.837742][T22388] dump_header+0x10b/0x82d [ 1660.842179][T22388] oom_kill_process.cold+0x10/0x15 [ 1660.847306][T22388] out_of_memory+0x334/0x1340 [ 1660.852015][T22388] ? __sched_text_start+0x8/0x8 [ 1660.856874][T22388] ? oom_killer_disable+0x280/0x280 [ 1660.862086][T22388] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1660.867640][T22388] ? memcg_stat_show+0xc40/0xc40 [ 1660.872590][T22388] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1660.878403][T22388] ? cgroup_file_notify+0x140/0x1b0 [ 1660.883638][T22388] memory_max_write+0x262/0x3a0 [ 1660.888496][T22388] ? mem_cgroup_write+0x370/0x370 [ 1660.893524][T22388] ? lock_acquire+0x190/0x410 [ 1660.898220][T22388] ? kernfs_fop_write+0x227/0x480 [ 1660.903254][T22388] cgroup_file_write+0x241/0x790 [ 1660.908294][T22388] ? mem_cgroup_write+0x370/0x370 [ 1660.913325][T22388] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1660.918978][T22388] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1660.924619][T22388] kernfs_fop_write+0x2b8/0x480 [ 1660.929478][T22388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1660.935726][T22388] __vfs_write+0x8a/0x110 [ 1660.940059][T22388] ? kernfs_fop_open+0xd80/0xd80 [ 1660.945003][T22388] vfs_write+0x268/0x5d0 [ 1660.949254][T22388] ksys_write+0x14f/0x290 [ 1660.953584][T22388] ? __ia32_sys_read+0xb0/0xb0 [ 1660.958352][T22388] ? do_syscall_64+0x26/0x760 [ 1660.963053][T22388] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1660.969123][T22388] ? do_syscall_64+0x26/0x760 [ 1660.973810][T22388] __x64_sys_write+0x73/0xb0 [ 1660.978406][T22388] do_syscall_64+0xfa/0x760 [ 1660.982918][T22388] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1660.988810][T22388] RIP: 0033:0x459a59 [ 1660.992715][T22388] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1661.012412][T22388] RSP: 002b:00007f9285651c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1661.020848][T22388] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 1661.028842][T22388] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1661.036814][T22388] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1661.044789][T22388] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f92856526d4 [ 1661.052764][T22388] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 1661.074460][T22388] memory: usage 3368kB, limit 0kB, failcnt 888 [ 1661.080842][T22388] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1661.089394][T22388] Memory cgroup stats for /syz1: [ 1661.090781][T22388] anon 2179072 [ 1661.090781][T22388] file 0 [ 1661.090781][T22388] kernel_stack 65536 [ 1661.090781][T22388] slab 909312 [ 1661.090781][T22388] sock 0 [ 1661.090781][T22388] shmem 0 [ 1661.090781][T22388] file_mapped 0 [ 1661.090781][T22388] file_dirty 0 [ 1661.090781][T22388] file_writeback 0 [ 1661.090781][T22388] anon_thp 2097152 [ 1661.090781][T22388] inactive_anon 0 [ 1661.090781][T22388] active_anon 2179072 [ 1661.090781][T22388] inactive_file 0 [ 1661.090781][T22388] active_file 0 [ 1661.090781][T22388] unevictable 0 [ 1661.090781][T22388] slab_reclaimable 270336 [ 1661.090781][T22388] slab_unreclaimable 638976 [ 1661.090781][T22388] pgfault 15609 [ 1661.090781][T22388] pgmajfault 0 [ 1661.090781][T22388] workingset_refault 0 [ 1661.090781][T22388] workingset_activate 0 [ 1661.090781][T22388] workingset_nodereclaim 0 [ 1661.090781][T22388] pgrefill 0 [ 1661.090781][T22388] pgscan 33 [ 1661.090781][T22388] pgsteal 0 [ 1661.090781][T22388] pgactivate 0 [ 1661.186368][T22388] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=22387,uid=0 [ 1661.203599][T22388] Memory cgroup out of memory: Killed process 22387 (syz-executor.1) total-vm:72712kB, anon-rss:2188kB, file-rss:35804kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 1661.226103][ T1072] oom_reaper: reaped process 22387 (syz-executor.1), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB [ 1663.740474][T22339] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1663.762061][T22339] CPU: 1 PID: 22339 Comm: syz-executor.1 Not tainted 5.4.0-rc1+ #0 [ 1663.770006][T22339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1663.780320][T22339] Call Trace: [ 1663.783630][T22339] dump_stack+0x172/0x1f0 [ 1663.787971][T22339] dump_header+0x10b/0x82d [ 1663.792390][T22339] ? oom_kill_process+0x94/0x3f0 [ 1663.797335][T22339] oom_kill_process.cold+0x10/0x15 [ 1663.802452][T22339] out_of_memory+0x334/0x1340 [ 1663.807154][T22339] ? lock_downgrade+0x920/0x920 [ 1663.812164][T22339] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 1663.817996][T22339] ? oom_killer_disable+0x280/0x280 [ 1663.823932][T22339] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1663.829497][T22339] ? memcg_stat_show+0xc40/0xc40 [ 1663.834450][T22339] ? do_raw_spin_unlock+0x57/0x270 [ 1663.839734][T22339] ? _raw_spin_unlock+0x2d/0x50 [ 1663.844679][T22339] try_charge+0xf4b/0x1440 [ 1663.849107][T22339] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1663.854647][T22339] ? percpu_ref_tryget_live+0x111/0x290 [ 1663.860188][T22339] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1663.866427][T22339] ? __kasan_check_read+0x11/0x20 [ 1663.871454][T22339] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1663.877024][T22339] mem_cgroup_try_charge+0x136/0x590 [ 1663.882316][T22339] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1663.887952][T22339] wp_page_copy+0x407/0x1860 [ 1663.892538][T22339] ? find_held_lock+0x35/0x130 [ 1663.897299][T22339] ? do_wp_page+0x53b/0x15c0 [ 1663.901888][T22339] ? pmd_devmap_trans_unstable+0x220/0x220 [ 1663.907692][T22339] ? lock_downgrade+0x920/0x920 [ 1663.912550][T22339] ? swp_swapcount+0x540/0x540 [ 1663.917312][T22339] ? __kasan_check_read+0x11/0x20 [ 1663.922333][T22339] ? do_raw_spin_unlock+0x57/0x270 [ 1663.927443][T22339] do_wp_page+0x543/0x15c0 [ 1663.931859][T22339] ? finish_mkwrite_fault+0x6a0/0x6a0 [ 1663.937240][T22339] __handle_mm_fault+0x23ec/0x4040 [ 1663.942353][T22339] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1663.947895][T22339] ? handle_mm_fault+0x292/0xaa0 [ 1663.952841][T22339] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1663.959080][T22339] ? __kasan_check_read+0x11/0x20 [ 1663.964118][T22339] handle_mm_fault+0x3b7/0xaa0 [ 1663.968888][T22339] __do_page_fault+0x536/0xdd0 [ 1663.973670][T22339] do_page_fault+0x38/0x590 [ 1663.978178][T22339] page_fault+0x39/0x40 [ 1663.982325][T22339] RIP: 0033:0x430b36 [ 1663.986224][T22339] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 44 64 00 85 c0 0f 84 [ 1664.006533][T22339] RSP: 002b:00007ffdd2a69500 EFLAGS: 00010206 [ 1664.012600][T22339] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1664.020660][T22339] RDX: 0000000000d81930 RSI: 0000000000d89970 RDI: 0000000000000003 [ 1664.028626][T22339] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000000d80940 [ 1664.036612][T22339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1664.044582][T22339] R13: 0000000000716698 R14: 00000000001956c7 R15: 0000000000002710 [ 1664.056479][T22339] memory: usage 1048kB, limit 0kB, failcnt 900 [ 1664.064985][T22339] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1664.071896][T22339] Memory cgroup stats for /syz1: [ 1664.072433][T22339] anon 0 [ 1664.072433][T22339] file 0 [ 1664.072433][T22339] kernel_stack 65536 [ 1664.072433][T22339] slab 909312 [ 1664.072433][T22339] sock 0 [ 1664.072433][T22339] shmem 0 [ 1664.072433][T22339] file_mapped 0 [ 1664.072433][T22339] file_dirty 0 [ 1664.072433][T22339] file_writeback 0 [ 1664.072433][T22339] anon_thp 0 [ 1664.072433][T22339] inactive_anon 0 [ 1664.072433][T22339] active_anon 0 [ 1664.072433][T22339] inactive_file 0 [ 1664.072433][T22339] active_file 0 [ 1664.072433][T22339] unevictable 0 [ 1664.072433][T22339] slab_reclaimable 270336 [ 1664.072433][T22339] slab_unreclaimable 638976 [ 1664.072433][T22339] pgfault 15609 [ 1664.072433][T22339] pgmajfault 0 [ 1664.072433][T22339] workingset_refault 0 [ 1664.072433][T22339] workingset_activate 0 [ 1664.072433][T22339] workingset_nodereclaim 0 [ 1664.072433][T22339] pgrefill 0 [ 1664.072433][T22339] pgscan 33 [ 1664.072433][T22339] pgsteal 0 [ 1664.072433][T22339] pgactivate 0 [ 1664.072433][T22339] pgdeactivate 0 [ 1664.168255][T22339] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=22339,uid=0 [ 1664.184543][T22339] Memory cgroup out of memory: Killed process 22339 (syz-executor.1) total-vm:72448kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 [ 1664.203351][ T1072] oom_reaper: reaped process 22339 (syz-executor.1), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 1666.572801][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1666.582620][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1666.591207][T22093] bridge0: port 1(bridge_slave_0) entered blocking state [ 1666.598344][T22093] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1666.609223][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1666.618313][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1666.628843][T22093] bridge0: port 2(bridge_slave_1) entered blocking state [ 1666.635963][T22093] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1666.928067][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1666.938198][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1666.947696][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1666.959117][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1666.969697][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 00:14:22 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)=@isdn={0x22, 0x400, 0x100000000, 0x1f06, 0x1}, 0x80, &(0x7f0000000340)}, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 00:14:22 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:14:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xffffffff, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:14:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xffffff9e, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1667.029827][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1667.056454][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1667.078316][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1667.103461][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1667.122984][T22397] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1667.134131][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 00:14:22 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)=@isdn={0x22, 0x400, 0x100000000, 0x1f06, 0x1}, 0x80, &(0x7f0000000340)}, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1667.176645][T22377] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1667.216822][T22377] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1667.310955][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1667.325655][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1667.534128][T22379] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1667.713737][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1667.724209][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1667.731712][T22396] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1667.767928][T22379] 8021q: adding VLAN 0 to HW filter on device team0 [ 1667.818858][T22377] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1667.935919][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1667.950839][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1667.969229][T22087] bridge0: port 1(bridge_slave_0) entered blocking state [ 1667.976359][T22087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1667.995734][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1668.005249][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1668.014548][T22087] bridge0: port 2(bridge_slave_1) entered blocking state [ 1668.021622][T22087] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1668.051657][T22393] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1668.089795][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1668.100075][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1668.109955][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1668.216566][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1668.226836][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1668.229427][T22410] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1668.246999][T22410] CPU: 0 PID: 22410 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 1668.253061][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1668.254908][T22410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1668.272834][T22410] Call Trace: [ 1668.273221][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1668.276128][T22410] dump_stack+0x172/0x1f0 [ 1668.288235][T22410] dump_header+0x10b/0x82d [ 1668.292663][T22410] oom_kill_process.cold+0x10/0x15 [ 1668.293038][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1668.297774][T22410] out_of_memory+0x334/0x1340 [ 1668.310230][T22410] ? __sched_text_start+0x8/0x8 [ 1668.315088][T22410] ? oom_killer_disable+0x280/0x280 [ 1668.320301][T22410] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1668.322933][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1668.325861][T22410] ? memcg_stat_show+0xc40/0xc40 [ 1668.338747][T22410] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1668.344557][T22410] ? cgroup_file_notify+0x140/0x1b0 [ 1668.349773][T22410] memory_max_write+0x262/0x3a0 [ 1668.354717][T22410] ? mem_cgroup_write+0x370/0x370 [ 1668.359851][T22410] ? cgroup_file_write+0x86/0x790 [ 1668.364872][T22410] cgroup_file_write+0x241/0x790 [ 1668.364889][T22410] ? mem_cgroup_write+0x370/0x370 [ 1668.364903][T22410] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1668.364924][T22410] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1668.364939][T22410] kernfs_fop_write+0x2b8/0x480 [ 1668.364956][T22410] __vfs_write+0x8a/0x110 [ 1668.380532][T22410] ? kernfs_fop_open+0xd80/0xd80 [ 1668.380550][T22410] vfs_write+0x268/0x5d0 [ 1668.380568][T22410] ksys_write+0x14f/0x290 [ 1668.391548][T22410] ? __ia32_sys_read+0xb0/0xb0 [ 1668.391572][T22410] ? do_syscall_64+0x26/0x760 [ 1668.405342][T22410] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1668.405358][T22410] ? do_syscall_64+0x26/0x760 [ 1668.405380][T22410] __x64_sys_write+0x73/0xb0 [ 1668.405400][T22410] do_syscall_64+0xfa/0x760 [ 1668.413950][T22410] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1668.413962][T22410] RIP: 0033:0x459a59 [ 1668.413977][T22410] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1668.413984][T22410] RSP: 002b:00007fd3dcf5ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1668.423394][T22410] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 1668.423403][T22410] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1668.423411][T22410] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1668.423419][T22410] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd3dcf5b6d4 [ 1668.423427][T22410] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 1668.474679][T22410] memory: usage 3156kB, limit 0kB, failcnt 376 [ 1668.576180][T22410] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1668.580966][T22379] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1668.583690][T22410] Memory cgroup stats for /syz4: [ 1668.584414][T22410] anon 2191360 [ 1668.584414][T22410] file 40960 [ 1668.584414][T22410] kernel_stack 65536 [ 1668.584414][T22410] slab 970752 [ 1668.584414][T22410] sock 0 [ 1668.584414][T22410] shmem 0 [ 1668.584414][T22410] file_mapped 0 [ 1668.584414][T22410] file_dirty 0 [ 1668.584414][T22410] file_writeback 0 [ 1668.584414][T22410] anon_thp 2097152 [ 1668.584414][T22410] inactive_anon 0 [ 1668.584414][T22410] active_anon 2191360 [ 1668.584414][T22410] inactive_file 131072 [ 1668.584414][T22410] active_file 0 [ 1668.584414][T22410] unevictable 0 [ 1668.584414][T22410] slab_reclaimable 270336 [ 1668.584414][T22410] slab_unreclaimable 700416 [ 1668.584414][T22410] pgfault 37455 [ 1668.584414][T22410] pgmajfault 0 [ 1668.584414][T22410] workingset_refault 0 [ 1668.584414][T22410] workingset_activate 0 [ 1668.584414][T22410] workingset_nodereclaim 0 [ 1668.584414][T22410] pgrefill 69 [ 1668.584414][T22410] pgscan 5378 [ 1668.584414][T22410] pgsteal 5230 [ 1668.584414][T22410] pgactivate 99 [ 1668.632846][T22379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1668.692312][T22400] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1668.725198][T22410] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=22409,uid=0 [ 1668.746851][T22410] Memory cgroup out of memory: Killed process 22409 (syz-executor.4) total-vm:72580kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 1668.774257][ T1072] oom_reaper: reaped process 22409 (syz-executor.4), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB [ 1668.857757][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1668.872661][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1668.890474][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 00:14:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r5, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r5, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r4, 0x0, 0x0) [ 1668.979656][T22377] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1669.003621][T22413] IPVS: ftp: loaded support on port[0] = 21 [ 1669.012178][T22377] CPU: 1 PID: 22377 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 1669.020077][T22377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1669.030134][T22377] Call Trace: [ 1669.033435][T22377] dump_stack+0x172/0x1f0 [ 1669.037770][T22377] dump_header+0x10b/0x82d [ 1669.042209][T22377] ? oom_kill_process+0x94/0x3f0 [ 1669.047158][T22377] oom_kill_process.cold+0x10/0x15 [ 1669.052808][T22377] out_of_memory+0x334/0x1340 [ 1669.057484][T22377] ? lock_downgrade+0x920/0x920 [ 1669.062337][T22377] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 1669.068143][T22377] ? oom_killer_disable+0x280/0x280 [ 1669.073345][T22377] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1669.078888][T22377] ? memcg_stat_show+0xc40/0xc40 [ 1669.083826][T22377] ? do_raw_spin_unlock+0x57/0x270 [ 1669.088936][T22377] ? _raw_spin_unlock+0x2d/0x50 [ 1669.093795][T22377] try_charge+0xf4b/0x1440 [ 1669.098218][T22377] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1669.103763][T22377] ? percpu_ref_tryget_live+0x111/0x290 [ 1669.109827][T22377] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1669.116066][T22377] ? __kasan_check_read+0x11/0x20 [ 1669.121790][T22377] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1669.127346][T22377] mem_cgroup_try_charge+0x136/0x590 [ 1669.132638][T22377] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1669.138295][T22377] wp_page_copy+0x407/0x1860 [ 1669.142885][T22377] ? find_held_lock+0x35/0x130 [ 1669.147642][T22377] ? do_wp_page+0x53b/0x15c0 [ 1669.152230][T22377] ? pmd_devmap_trans_unstable+0x220/0x220 [ 1669.158046][T22377] ? lock_downgrade+0x920/0x920 [ 1669.162894][T22377] ? swp_swapcount+0x540/0x540 [ 1669.167660][T22377] ? __kasan_check_read+0x11/0x20 [ 1669.172675][T22377] ? do_raw_spin_unlock+0x57/0x270 [ 1669.177788][T22377] do_wp_page+0x543/0x15c0 [ 1669.182202][T22377] ? finish_mkwrite_fault+0x6a0/0x6a0 [ 1669.187584][T22377] __handle_mm_fault+0x23ec/0x4040 [ 1669.192697][T22377] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1669.198236][T22377] ? handle_mm_fault+0x292/0xaa0 [ 1669.203299][T22377] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1669.209538][T22377] ? __kasan_check_read+0x11/0x20 [ 1669.214563][T22377] handle_mm_fault+0x3b7/0xaa0 [ 1669.219330][T22377] __do_page_fault+0x536/0xdd0 [ 1669.224103][T22377] do_page_fault+0x38/0x590 [ 1669.228610][T22377] page_fault+0x39/0x40 [ 1669.232755][T22377] RIP: 0033:0x430b36 [ 1669.236649][T22377] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 44 64 00 85 c0 0f 84 [ 1669.256247][T22377] RSP: 002b:00007ffeef1f9910 EFLAGS: 00010206 [ 1669.262395][T22377] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1669.270367][T22377] RDX: 0000000002068930 RSI: 0000000002070970 RDI: 0000000000000003 [ 1669.278339][T22377] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002067940 [ 1669.286300][T22377] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1669.294271][T22377] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 [ 1669.311640][T22377] memory: usage 832kB, limit 0kB, failcnt 384 [ 1669.317806][T22377] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1669.317812][T22377] Memory cgroup stats for /syz4: [ 1669.317907][T22377] anon 0 [ 1669.317907][T22377] file 40960 [ 1669.317907][T22377] kernel_stack 0 [ 1669.317907][T22377] slab 970752 [ 1669.317907][T22377] sock 0 [ 1669.317907][T22377] shmem 0 [ 1669.317907][T22377] file_mapped 0 [ 1669.317907][T22377] file_dirty 0 [ 1669.317907][T22377] file_writeback 0 [ 1669.317907][T22377] anon_thp 0 [ 1669.317907][T22377] inactive_anon 0 [ 1669.317907][T22377] active_anon 0 [ 1669.317907][T22377] inactive_file 131072 [ 1669.317907][T22377] active_file 0 [ 1669.317907][T22377] unevictable 0 [ 1669.317907][T22377] slab_reclaimable 270336 [ 1669.317907][T22377] slab_unreclaimable 700416 [ 1669.317907][T22377] pgfault 37488 [ 1669.317907][T22377] pgmajfault 0 [ 1669.317907][T22377] workingset_refault 0 [ 1669.317907][T22377] workingset_activate 0 [ 1669.317907][T22377] workingset_nodereclaim 0 [ 1669.317907][T22377] pgrefill 69 [ 1669.317907][T22377] pgscan 5378 [ 1669.317907][T22377] pgsteal 5230 [ 1669.317907][T22377] pgactivate 99 [ 1669.317925][T22377] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=22377,uid=0 [ 1669.318024][T22377] Memory cgroup out of memory: Killed process 22377 (syz-executor.4) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 [ 1669.318779][ T1072] oom_reaper: reaped process 22377 (syz-executor.4), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 1669.544344][T22379] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1670.140257][T22413] chnl_net:caif_netlink_parms(): no params data found [ 1670.596852][T22413] bridge0: port 1(bridge_slave_0) entered blocking state [ 1670.612961][T22413] bridge0: port 1(bridge_slave_0) entered disabled state [ 1670.632715][T22413] device bridge_slave_0 entered promiscuous mode [ 1670.654190][T22413] bridge0: port 2(bridge_slave_1) entered blocking state [ 1670.661346][T22413] bridge0: port 2(bridge_slave_1) entered disabled state [ 1670.670018][T22413] device bridge_slave_1 entered promiscuous mode [ 1670.760884][T22413] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1670.780096][T22413] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1670.803012][T22413] team0: Port device team_slave_0 added [ 1670.849188][T22413] team0: Port device team_slave_1 added [ 1670.995541][T22413] device hsr_slave_0 entered promiscuous mode [ 1671.082890][T22413] device hsr_slave_1 entered promiscuous mode [ 1671.122240][T22413] debugfs: Directory 'hsr0' with parent '/' already present! [ 1671.411714][T22413] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1671.484217][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1671.493404][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1671.505792][T22413] 8021q: adding VLAN 0 to HW filter on device team0 [ 1671.523087][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1671.531933][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1671.541592][ T2851] bridge0: port 1(bridge_slave_0) entered blocking state [ 1671.549674][ T2851] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1671.615111][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1671.623524][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1671.632866][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1671.641397][ T2851] bridge0: port 2(bridge_slave_1) entered blocking state [ 1671.648513][ T2851] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1671.657972][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1671.741540][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1671.753419][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1671.762934][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1671.784525][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1671.803281][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1671.823655][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1671.842688][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1671.851423][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1671.931408][T22413] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1671.948725][T22413] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1671.959648][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1671.960363][T22422] IPVS: ftp: loaded support on port[0] = 21 [ 1671.969200][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1672.050478][T22413] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1672.349249][T22422] chnl_net:caif_netlink_parms(): no params data found [ 1672.603145][T22422] bridge0: port 1(bridge_slave_0) entered blocking state [ 1672.610311][T22422] bridge0: port 1(bridge_slave_0) entered disabled state [ 1672.624726][T22422] device bridge_slave_0 entered promiscuous mode [ 1672.634181][T22422] bridge0: port 2(bridge_slave_1) entered blocking state [ 1672.641336][T22422] bridge0: port 2(bridge_slave_1) entered disabled state [ 1672.650029][T22422] device bridge_slave_1 entered promiscuous mode [ 1672.720039][T22422] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1672.733324][T22422] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1672.759471][T22422] team0: Port device team_slave_0 added [ 1672.768478][T22422] team0: Port device team_slave_1 added [ 1672.845668][T22422] device hsr_slave_0 entered promiscuous mode [ 1672.883178][T22422] device hsr_slave_1 entered promiscuous mode [ 1672.962414][T22422] debugfs: Directory 'hsr0' with parent '/' already present! [ 1673.051218][T22422] bridge0: port 2(bridge_slave_1) entered blocking state [ 1673.058370][T22422] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1673.065788][T22422] bridge0: port 1(bridge_slave_0) entered blocking state [ 1673.072884][T22422] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1673.216060][T22422] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1673.296972][T20483] bridge0: port 1(bridge_slave_0) entered disabled state [ 1673.306294][T20483] bridge0: port 2(bridge_slave_1) entered disabled state [ 1673.386308][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1673.394767][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1673.405910][T22422] 8021q: adding VLAN 0 to HW filter on device team0 [ 1673.420923][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1673.430835][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1673.440080][T22093] bridge0: port 1(bridge_slave_0) entered blocking state [ 1673.447218][T22093] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1673.554207][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1673.564177][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1673.573487][T20483] bridge0: port 2(bridge_slave_1) entered blocking state [ 1673.580544][T20483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1673.589335][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1673.654851][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1673.665416][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1673.674880][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1673.684511][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1673.768735][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1673.779272][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1673.799009][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1673.808255][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1673.817409][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1673.827542][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1673.839439][T22422] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1673.919222][T22422] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1674.195078][T22438] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1674.206475][T22438] CPU: 1 PID: 22438 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 1674.214384][T22438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1674.224437][T22438] Call Trace: [ 1674.227752][T22438] dump_stack+0x172/0x1f0 [ 1674.232085][T22438] dump_header+0x10b/0x82d [ 1674.236511][T22438] oom_kill_process.cold+0x10/0x15 [ 1674.241620][T22438] out_of_memory+0x334/0x1340 [ 1674.246430][T22438] ? __sched_text_start+0x8/0x8 [ 1674.251264][T22438] ? oom_killer_disable+0x280/0x280 [ 1674.256497][T22438] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1674.262036][T22438] ? memcg_stat_show+0xc40/0xc40 [ 1674.266965][T22438] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1674.272755][T22438] ? cgroup_file_notify+0x140/0x1b0 [ 1674.277929][T22438] memory_max_write+0x262/0x3a0 [ 1674.282809][T22438] ? mem_cgroup_write+0x370/0x370 [ 1674.287834][T22438] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1674.293325][T22438] cgroup_file_write+0x241/0x790 [ 1674.298239][T22438] ? mem_cgroup_write+0x370/0x370 [ 1674.303251][T22438] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1674.308865][T22438] ? kernfs_ops+0x9f/0x120 [ 1674.313258][T22438] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1674.318875][T22438] kernfs_fop_write+0x2b8/0x480 [ 1674.323704][T22438] __vfs_write+0x8a/0x110 [ 1674.328008][T22438] ? kernfs_fop_open+0xd80/0xd80 [ 1674.332946][T22438] vfs_write+0x268/0x5d0 [ 1674.337168][T22438] ksys_write+0x14f/0x290 [ 1674.341475][T22438] ? __ia32_sys_read+0xb0/0xb0 [ 1674.346220][T22438] ? do_syscall_64+0x26/0x760 [ 1674.350878][T22438] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1674.356932][T22438] ? do_syscall_64+0x26/0x760 [ 1674.361587][T22438] __x64_sys_write+0x73/0xb0 [ 1674.366154][T22438] do_syscall_64+0xfa/0x760 [ 1674.370719][T22438] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1674.376618][T22438] RIP: 0033:0x459a59 [ 1674.380528][T22438] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1674.400441][T22438] RSP: 002b:00007f46e0ec4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1674.408847][T22438] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 1674.416802][T22438] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1674.424769][T22438] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1674.432718][T22438] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f46e0ec56d4 [ 1674.441631][T22438] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 1674.479093][T22438] memory: usage 3308kB, limit 0kB, failcnt 721 [ 1674.486087][T22438] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1674.493917][T22438] Memory cgroup stats for /syz5: [ 1674.495072][T22438] anon 2203648 [ 1674.495072][T22438] file 12288 [ 1674.495072][T22438] kernel_stack 65536 [ 1674.495072][T22438] slab 937984 [ 1674.495072][T22438] sock 0 [ 1674.495072][T22438] shmem 0 [ 1674.495072][T22438] file_mapped 0 [ 1674.495072][T22438] file_dirty 0 [ 1674.495072][T22438] file_writeback 0 [ 1674.495072][T22438] anon_thp 2097152 [ 1674.495072][T22438] inactive_anon 0 [ 1674.495072][T22438] active_anon 2203648 [ 1674.495072][T22438] inactive_file 0 [ 1674.495072][T22438] active_file 0 [ 1674.495072][T22438] unevictable 0 [ 1674.495072][T22438] slab_reclaimable 135168 [ 1674.495072][T22438] slab_unreclaimable 802816 [ 1674.495072][T22438] pgfault 27984 [ 1674.495072][T22438] pgmajfault 0 [ 1674.495072][T22438] workingset_refault 0 [ 1674.495072][T22438] workingset_activate 0 [ 1674.495072][T22438] workingset_nodereclaim 0 [ 1674.495072][T22438] pgrefill 33 [ 1674.495072][T22438] pgscan 33 [ 1674.495072][T22438] pgsteal 0 [ 1674.495072][T22438] pgactivate 0 [ 1674.594326][T22438] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=22437,uid=0 [ 1674.611235][T22438] Memory cgroup out of memory: Killed process 22437 (syz-executor.5) total-vm:72712kB, anon-rss:2136kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 1674.641678][ T1072] oom_reaper: reaped process 22437 (syz-executor.5), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB 00:14:30 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r6, 0x0, 0x0) 00:14:30 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:14:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xfffffff0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) 00:14:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r5, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r5, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r4, 0x0, 0x0) 00:14:30 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)=@isdn={0x22, 0x400, 0x100000000, 0x1f06, 0x1}, 0x80, &(0x7f0000000340)}, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 00:14:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="0f0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1674.837373][T22422] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1674.891386][T22422] CPU: 0 PID: 22422 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 1674.899312][T22422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1674.909372][T22422] Call Trace: [ 1674.912674][T22422] dump_stack+0x172/0x1f0 [ 1674.917018][T22422] dump_header+0x10b/0x82d [ 1674.921442][T22422] ? oom_kill_process+0x94/0x3f0 [ 1674.926397][T22422] oom_kill_process.cold+0x10/0x15 [ 1674.931515][T22422] out_of_memory+0x334/0x1340 [ 1674.934372][T22444] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1674.936189][T22422] ? lock_downgrade+0x920/0x920 [ 1674.936210][T22422] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 1674.936228][T22422] ? oom_killer_disable+0x280/0x280 [ 1674.936253][T22422] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1674.936271][T22422] ? memcg_stat_show+0xc40/0xc40 [ 1674.971849][T22422] ? do_raw_spin_unlock+0x57/0x270 [ 1674.977079][T22422] ? _raw_spin_unlock+0x2d/0x50 [ 1674.981941][T22422] try_charge+0xf4b/0x1440 [ 1674.986383][T22422] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1674.991931][T22422] ? percpu_ref_tryget_live+0x111/0x290 [ 1674.997490][T22422] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1675.003746][T22422] ? __kasan_check_read+0x11/0x20 [ 1675.008809][T22422] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1675.014368][T22422] mem_cgroup_try_charge+0x136/0x590 [ 1675.019670][T22422] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1675.019690][T22422] wp_page_copy+0x407/0x1860 [ 1675.019708][T22422] ? find_held_lock+0x35/0x130 [ 1675.019723][T22422] ? do_wp_page+0x53b/0x15c0 [ 1675.019741][T22422] ? pmd_devmap_trans_unstable+0x220/0x220 [ 1675.019758][T22422] ? lock_downgrade+0x920/0x920 [ 1675.019784][T22422] ? swp_swapcount+0x540/0x540 [ 1675.054718][T22422] ? __kasan_check_read+0x11/0x20 [ 1675.059755][T22422] ? do_raw_spin_unlock+0x57/0x270 [ 1675.064880][T22422] do_wp_page+0x543/0x15c0 [ 1675.069339][T22422] ? finish_mkwrite_fault+0x6a0/0x6a0 [ 1675.074726][T22422] __handle_mm_fault+0x23ec/0x4040 [ 1675.079848][T22422] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1675.085406][T22422] ? handle_mm_fault+0x292/0xaa0 [ 1675.090364][T22422] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1675.096611][T22422] ? __kasan_check_read+0x11/0x20 [ 1675.101646][T22422] handle_mm_fault+0x3b7/0xaa0 [ 1675.106413][T22422] __do_page_fault+0x536/0xdd0 [ 1675.106438][T22422] do_page_fault+0x38/0x590 [ 1675.106460][T22422] page_fault+0x39/0x40 [ 1675.106472][T22422] RIP: 0033:0x430b36 [ 1675.106496][T22422] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 44 64 00 85 c0 0f 84 [ 1675.143850][T22422] RSP: 002b:00007ffff3fc0030 EFLAGS: 00010206 [ 1675.149919][T22422] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1675.149928][T22422] RDX: 000000000159a930 RSI: 00000000015a2970 RDI: 0000000000000003 [ 1675.149936][T22422] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000001599940 [ 1675.149943][T22422] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1675.149951][T22422] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 00:14:30 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:14:30 executing program 1: [ 1675.362104][T22422] memory: usage 932kB, limit 0kB, failcnt 729 [ 1675.373029][T22422] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1675.408604][T22422] Memory cgroup stats for /syz5: [ 1675.408724][T22422] anon 94208 [ 1675.408724][T22422] file 12288 [ 1675.408724][T22422] kernel_stack 0 [ 1675.408724][T22422] slab 937984 [ 1675.408724][T22422] sock 0 [ 1675.408724][T22422] shmem 0 [ 1675.408724][T22422] file_mapped 0 [ 1675.408724][T22422] file_dirty 0 [ 1675.408724][T22422] file_writeback 0 [ 1675.408724][T22422] anon_thp 0 [ 1675.408724][T22422] inactive_anon 0 [ 1675.408724][T22422] active_anon 94208 [ 1675.408724][T22422] inactive_file 0 [ 1675.408724][T22422] active_file 0 00:14:30 executing program 1: 00:14:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="140000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1675.408724][T22422] unevictable 0 [ 1675.408724][T22422] slab_reclaimable 135168 [ 1675.408724][T22422] slab_unreclaimable 802816 [ 1675.408724][T22422] pgfault 27984 [ 1675.408724][T22422] pgmajfault 0 [ 1675.408724][T22422] workingset_refault 0 [ 1675.408724][T22422] workingset_activate 0 [ 1675.408724][T22422] workingset_nodereclaim 0 [ 1675.408724][T22422] pgrefill 33 [ 1675.408724][T22422] pgscan 33 [ 1675.408724][T22422] pgsteal 0 [ 1675.408724][T22422] pgactivate 0 00:14:30 executing program 1: [ 1675.687124][T22422] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=22422,uid=0 00:14:31 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1675.806055][T22422] Memory cgroup out of memory: Killed process 22422 (syz-executor.5) total-vm:72448kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 00:14:31 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r6, 0x0, 0x0) 00:14:31 executing program 1: [ 1676.482839][T22473] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1676.539883][T22487] IPVS: ftp: loaded support on port[0] = 21 00:14:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xffffffff, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1676.840080][T22492] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1676.991568][T22492] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1677.037515][T22487] chnl_net:caif_netlink_parms(): no params data found [ 1677.194896][T22487] bridge0: port 1(bridge_slave_0) entered blocking state [ 1677.207059][T22487] bridge0: port 1(bridge_slave_0) entered disabled state [ 1677.215880][T22487] device bridge_slave_0 entered promiscuous mode [ 1677.337603][T22487] bridge0: port 2(bridge_slave_1) entered blocking state [ 1677.345158][T22487] bridge0: port 2(bridge_slave_1) entered disabled state [ 1677.353839][T22487] device bridge_slave_1 entered promiscuous mode [ 1677.381103][T22487] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1677.435512][T22487] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1677.460315][T22487] team0: Port device team_slave_0 added [ 1677.468237][T22487] team0: Port device team_slave_1 added [ 1677.658442][T22487] device hsr_slave_0 entered promiscuous mode [ 1677.712949][T22487] device hsr_slave_1 entered promiscuous mode [ 1677.812255][T22487] debugfs: Directory 'hsr0' with parent '/' already present! [ 1678.041756][T22487] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1678.114147][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1678.122827][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1678.135945][T22487] 8021q: adding VLAN 0 to HW filter on device team0 [ 1678.148617][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1678.158111][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1678.166939][ T2851] bridge0: port 1(bridge_slave_0) entered blocking state [ 1678.174322][ T2851] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1678.257603][T22358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1678.268192][T22358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1678.277592][T22358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1678.286945][T22358] bridge0: port 2(bridge_slave_1) entered blocking state [ 1678.294079][T22358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1678.302901][T22358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1678.405694][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1678.425926][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1678.437579][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1678.446981][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1678.456726][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1678.572494][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1678.580785][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1678.590683][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1678.678823][T22487] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1678.954181][T22504] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1678.970827][T22504] CPU: 0 PID: 22504 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 1678.978908][T22504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1678.989074][T22504] Call Trace: [ 1678.992505][T22504] dump_stack+0x172/0x1f0 [ 1678.996858][T22504] dump_header+0x10b/0x82d [ 1679.001812][T22504] oom_kill_process.cold+0x10/0x15 [ 1679.007028][T22504] out_of_memory+0x334/0x1340 [ 1679.011718][T22504] ? __sched_text_start+0x8/0x8 [ 1679.017203][T22504] ? oom_killer_disable+0x280/0x280 [ 1679.022541][T22504] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1679.028274][T22504] ? memcg_stat_show+0xc40/0xc40 [ 1679.033322][T22504] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1679.039301][T22504] ? cgroup_file_notify+0x140/0x1b0 [ 1679.044537][T22504] memory_max_write+0x262/0x3a0 [ 1679.049543][T22504] ? mem_cgroup_write+0x370/0x370 [ 1679.054686][T22504] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1679.060342][T22504] cgroup_file_write+0x241/0x790 [ 1679.065424][T22504] ? mem_cgroup_write+0x370/0x370 [ 1679.070467][T22504] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1679.076234][T22504] ? kernfs_ops+0x9f/0x120 [ 1679.080667][T22504] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1679.086318][T22504] kernfs_fop_write+0x2b8/0x480 [ 1679.091260][T22504] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1679.097675][T22504] __vfs_write+0x8a/0x110 [ 1679.102194][T22504] ? kernfs_fop_open+0xd80/0xd80 [ 1679.107151][T22504] vfs_write+0x268/0x5d0 [ 1679.111409][T22504] ksys_write+0x14f/0x290 [ 1679.115842][T22504] ? __ia32_sys_read+0xb0/0xb0 [ 1679.120724][T22504] ? do_syscall_64+0x26/0x760 [ 1679.125499][T22504] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1679.131572][T22504] ? do_syscall_64+0x26/0x760 [ 1679.136391][T22504] __x64_sys_write+0x73/0xb0 [ 1679.141430][T22504] do_syscall_64+0xfa/0x760 [ 1679.146100][T22504] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1679.152126][T22504] RIP: 0033:0x459a59 [ 1679.156031][T22504] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1679.176548][T22504] RSP: 002b:00007fec0abc1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1679.185102][T22504] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 1679.193583][T22504] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 1679.201993][T22504] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1679.210254][T22504] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fec0abc26d4 [ 1679.218456][T22504] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 1679.239046][T22504] memory: usage 3140kB, limit 0kB, failcnt 385 [ 1679.245693][T22504] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1679.253237][T22504] Memory cgroup stats for /syz4: [ 1679.254607][T22504] anon 2183168 [ 1679.254607][T22504] file 40960 [ 1679.254607][T22504] kernel_stack 65536 [ 1679.254607][T22504] slab 835584 [ 1679.254607][T22504] sock 0 [ 1679.254607][T22504] shmem 0 [ 1679.254607][T22504] file_mapped 0 [ 1679.254607][T22504] file_dirty 0 [ 1679.254607][T22504] file_writeback 0 [ 1679.254607][T22504] anon_thp 2097152 [ 1679.254607][T22504] inactive_anon 0 [ 1679.254607][T22504] active_anon 2183168 [ 1679.254607][T22504] inactive_file 131072 [ 1679.254607][T22504] active_file 0 [ 1679.254607][T22504] unevictable 0 [ 1679.254607][T22504] slab_reclaimable 270336 [ 1679.254607][T22504] slab_unreclaimable 565248 [ 1679.254607][T22504] pgfault 37521 [ 1679.254607][T22504] pgmajfault 0 [ 1679.254607][T22504] workingset_refault 0 [ 1679.254607][T22504] workingset_activate 0 [ 1679.254607][T22504] workingset_nodereclaim 0 [ 1679.254607][T22504] pgrefill 69 [ 1679.254607][T22504] pgscan 5378 [ 1679.254607][T22504] pgsteal 5230 [ 1679.254607][T22504] pgactivate 99 [ 1679.373679][T22504] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=22503,uid=0 [ 1679.390372][T22504] Memory cgroup out of memory: Killed process 22503 (syz-executor.4) total-vm:72580kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 1679.421104][ T1072] oom_reaper: reaped process 22503 (syz-executor.4), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB 00:14:34 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r5, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r5, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r4, 0x0, 0x0) 00:14:34 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:14:34 executing program 1: 00:14:34 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r7, 0x0, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r6, 0x0, 0x0) 00:14:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="250000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:14:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="0a0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1679.614016][T22487] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1679.630961][T22487] CPU: 0 PID: 22487 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 1679.638885][T22487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1679.649040][T22487] Call Trace: [ 1679.652371][T22487] dump_stack+0x172/0x1f0 [ 1679.656994][T22487] dump_header+0x10b/0x82d [ 1679.661579][T22487] ? oom_kill_process+0x94/0x3f0 [ 1679.666803][T22487] oom_kill_process.cold+0x10/0x15 [ 1679.672114][T22487] out_of_memory+0x334/0x1340 [ 1679.676967][T22487] ? lock_downgrade+0x920/0x920 [ 1679.682023][T22487] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 1679.687856][T22487] ? oom_killer_disable+0x280/0x280 [ 1679.693093][T22487] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1679.698877][T22487] ? memcg_stat_show+0xc40/0xc40 [ 1679.703838][T22487] ? do_raw_spin_unlock+0x57/0x270 [ 1679.708968][T22487] ? _raw_spin_unlock+0x2d/0x50 [ 1679.713841][T22487] try_charge+0xf4b/0x1440 [ 1679.718291][T22487] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1679.723988][T22487] ? percpu_ref_tryget_live+0x111/0x290 [ 1679.729898][T22487] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1679.736611][T22487] ? __kasan_check_read+0x11/0x20 [ 1679.741895][T22487] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1679.747473][T22487] mem_cgroup_try_charge+0x136/0x590 [ 1679.753154][T22487] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1679.758924][T22487] wp_page_copy+0x407/0x1860 [ 1679.763543][T22487] ? find_held_lock+0x35/0x130 [ 1679.768336][T22487] ? do_wp_page+0x53b/0x15c0 [ 1679.772950][T22487] ? pmd_devmap_trans_unstable+0x220/0x220 [ 1679.772968][T22513] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1679.778856][T22487] ? lock_downgrade+0x920/0x920 [ 1679.778873][T22487] ? swp_swapcount+0x540/0x540 [ 1679.778889][T22487] ? __kasan_check_read+0x11/0x20 [ 1679.778903][T22487] ? do_raw_spin_unlock+0x57/0x270 [ 1679.778922][T22487] do_wp_page+0x543/0x15c0 [ 1679.778942][T22487] ? finish_mkwrite_fault+0x6a0/0x6a0 [ 1679.778968][T22487] __handle_mm_fault+0x23ec/0x4040 [ 1679.778987][T22487] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1679.779011][T22487] ? handle_mm_fault+0x292/0xaa0 [ 1679.835491][T22487] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1679.841763][T22487] ? __kasan_check_read+0x11/0x20 [ 1679.846845][T22487] handle_mm_fault+0x3b7/0xaa0 [ 1679.851644][T22487] __do_page_fault+0x536/0xdd0 [ 1679.856529][T22487] do_page_fault+0x38/0x590 [ 1679.861065][T22487] page_fault+0x39/0x40 [ 1679.865245][T22487] RIP: 0033:0x403522 [ 1679.869170][T22487] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 59 8f 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 79 44 05 00 48 [ 1679.889037][T22487] RSP: 002b:00007ffcaece4de0 EFLAGS: 00010246 [ 1679.895127][T22487] RAX: 0000000000000000 RBX: 0000000000199e3e RCX: 0000000000413660 [ 1679.903122][T22487] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffcaece5f10 00:14:35 executing program 1: [ 1679.911117][T22487] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000000001bdf940 [ 1679.919248][T22487] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffcaece5f10 [ 1679.927429][T22487] R13: 00007ffcaece5f00 R14: 0000000000000000 R15: 00007ffcaece5f10 00:14:35 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:14:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xffffffff, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1680.142193][T22487] memory: usage 820kB, limit 0kB, failcnt 393 [ 1680.148588][T22487] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1680.170481][T22487] Memory cgroup stats for /syz4: [ 1680.170590][T22487] anon 77824 [ 1680.170590][T22487] file 40960 [ 1680.170590][T22487] kernel_stack 65536 [ 1680.170590][T22487] slab 835584 [ 1680.170590][T22487] sock 0 [ 1680.170590][T22487] shmem 0 [ 1680.170590][T22487] file_mapped 0 [ 1680.170590][T22487] file_dirty 0 [ 1680.170590][T22487] file_writeback 0 [ 1680.170590][T22487] anon_thp 0 [ 1680.170590][T22487] inactive_anon 0 [ 1680.170590][T22487] active_anon 77824 [ 1680.170590][T22487] inactive_file 131072 [ 1680.170590][T22487] active_file 0 [ 1680.170590][T22487] unevictable 0 [ 1680.170590][T22487] slab_reclaimable 270336 [ 1680.170590][T22487] slab_unreclaimable 565248 [ 1680.170590][T22487] pgfault 37521 [ 1680.170590][T22487] pgmajfault 0 00:14:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="0f0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1680.170590][T22487] workingset_refault 0 [ 1680.170590][T22487] workingset_activate 0 [ 1680.170590][T22487] workingset_nodereclaim 0 [ 1680.170590][T22487] pgrefill 69 [ 1680.170590][T22487] pgscan 5378 [ 1680.170590][T22487] pgsteal 5230 [ 1680.170590][T22487] pgactivate 99 [ 1680.334073][T22487] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=22487,uid=0 [ 1680.359862][T22487] Memory cgroup out of memory: Killed process 22487 (syz-executor.4) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 00:14:35 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1680.398957][ T1072] oom_reaper: reaped process 22487 (syz-executor.4), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 1680.495992][T22528] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 00:14:35 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1681.172329][T22516] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 00:14:36 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r5, 0x0, 0x0) 00:14:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="140000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) 00:14:36 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1681.616831][T22550] IPVS: ftp: loaded support on port[0] = 21 [ 1682.045392][T22550] chnl_net:caif_netlink_parms(): no params data found [ 1682.131714][T22550] bridge0: port 1(bridge_slave_0) entered blocking state [ 1682.140608][T22550] bridge0: port 1(bridge_slave_0) entered disabled state [ 1682.149553][T22550] device bridge_slave_0 entered promiscuous mode [ 1682.159204][T22550] bridge0: port 2(bridge_slave_1) entered blocking state [ 1682.167082][T22550] bridge0: port 2(bridge_slave_1) entered disabled state [ 1682.175930][T22550] device bridge_slave_1 entered promiscuous mode [ 1682.241749][T22550] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1682.256995][T22550] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1682.284321][T22550] team0: Port device team_slave_0 added [ 1682.328860][T22550] team0: Port device team_slave_1 added [ 1682.425740][T22550] device hsr_slave_0 entered promiscuous mode [ 1682.572970][T22550] device hsr_slave_1 entered promiscuous mode [ 1682.652260][T22550] debugfs: Directory 'hsr0' with parent '/' already present! [ 1682.745015][T22550] bridge0: port 2(bridge_slave_1) entered blocking state [ 1682.752313][T22550] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1682.759698][T22550] bridge0: port 1(bridge_slave_0) entered blocking state [ 1682.766843][T22550] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1682.882895][T22550] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1682.900864][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1682.909898][T20483] bridge0: port 1(bridge_slave_0) entered disabled state [ 1682.918299][T20483] bridge0: port 2(bridge_slave_1) entered disabled state [ 1682.928077][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1682.985525][T22550] 8021q: adding VLAN 0 to HW filter on device team0 [ 1683.010083][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1683.019640][T18353] bridge0: port 1(bridge_slave_0) entered blocking state [ 1683.026799][T18353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1683.118993][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1683.129735][ T2851] bridge0: port 2(bridge_slave_1) entered blocking state [ 1683.136892][ T2851] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1683.246132][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1683.256289][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1683.285290][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1683.303647][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1683.319641][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1683.336772][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1683.347301][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1683.356587][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1683.365870][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1683.439783][T22550] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1683.471544][T22550] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1683.793642][T22566] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1683.804425][T22566] CPU: 0 PID: 22566 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 1683.812407][T22566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1683.822475][T22566] Call Trace: [ 1683.825931][T22566] dump_stack+0x172/0x1f0 [ 1683.830291][T22566] dump_header+0x10b/0x82d [ 1683.834921][T22566] oom_kill_process.cold+0x10/0x15 [ 1683.840146][T22566] out_of_memory+0x334/0x1340 [ 1683.844931][T22566] ? __sched_text_start+0x8/0x8 [ 1683.849956][T22566] ? oom_killer_disable+0x280/0x280 [ 1683.855594][T22566] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1683.861421][T22566] ? memcg_stat_show+0xc40/0xc40 [ 1683.866501][T22566] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1683.872312][T22566] ? cgroup_file_notify+0x140/0x1b0 [ 1683.877923][T22566] memory_max_write+0x262/0x3a0 [ 1683.882779][T22566] ? mem_cgroup_write+0x370/0x370 [ 1683.887903][T22566] ? lock_acquire+0x190/0x410 [ 1683.892583][T22566] ? kernfs_fop_write+0x227/0x480 [ 1683.897600][T22566] cgroup_file_write+0x241/0x790 [ 1683.902534][T22566] ? mem_cgroup_write+0x370/0x370 [ 1683.907550][T22566] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1683.913179][T22566] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1683.919025][T22566] kernfs_fop_write+0x2b8/0x480 [ 1683.923973][T22566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1683.930502][T22566] __vfs_write+0x8a/0x110 [ 1683.934991][T22566] ? kernfs_fop_open+0xd80/0xd80 [ 1683.940114][T22566] vfs_write+0x268/0x5d0 [ 1683.944399][T22566] ksys_write+0x14f/0x290 [ 1683.948766][T22566] ? __ia32_sys_read+0xb0/0xb0 [ 1683.953569][T22566] ? do_syscall_64+0x26/0x760 [ 1683.958658][T22566] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1683.964742][T22566] ? do_syscall_64+0x26/0x760 [ 1683.969943][T22566] __x64_sys_write+0x73/0xb0 [ 1683.974539][T22566] do_syscall_64+0xfa/0x760 [ 1683.979461][T22566] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1683.985722][T22566] RIP: 0033:0x459a59 [ 1683.989740][T22566] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1684.010143][T22566] RSP: 002b:00007fe1be4a5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1684.018924][T22566] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 1684.027288][T22566] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1684.035346][T22566] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1684.043327][T22566] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe1be4a66d4 [ 1684.051339][T22566] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 1684.084517][T22566] memory: usage 3300kB, limit 0kB, failcnt 730 [ 1684.090878][T22566] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1684.099367][T22566] Memory cgroup stats for /syz5: [ 1684.099486][T22566] anon 2240512 [ 1684.099486][T22566] file 12288 [ 1684.099486][T22566] kernel_stack 65536 [ 1684.099486][T22566] slab 937984 [ 1684.099486][T22566] sock 0 [ 1684.099486][T22566] shmem 0 [ 1684.099486][T22566] file_mapped 0 [ 1684.099486][T22566] file_dirty 0 [ 1684.099486][T22566] file_writeback 0 [ 1684.099486][T22566] anon_thp 2097152 [ 1684.099486][T22566] inactive_anon 0 [ 1684.099486][T22566] active_anon 2240512 [ 1684.099486][T22566] inactive_file 0 [ 1684.099486][T22566] active_file 0 [ 1684.099486][T22566] unevictable 0 [ 1684.099486][T22566] slab_reclaimable 135168 [ 1684.099486][T22566] slab_unreclaimable 802816 [ 1684.099486][T22566] pgfault 28050 [ 1684.099486][T22566] pgmajfault 0 [ 1684.099486][T22566] workingset_refault 0 [ 1684.099486][T22566] workingset_activate 0 [ 1684.099486][T22566] workingset_nodereclaim 0 [ 1684.099486][T22566] pgrefill 33 [ 1684.099486][T22566] pgscan 33 [ 1684.099486][T22566] pgsteal 0 [ 1684.099486][T22566] pgactivate 0 [ 1684.197420][T22566] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=22564,uid=0 [ 1684.214056][T22566] Memory cgroup out of memory: Killed process 22564 (syz-executor.5) total-vm:72712kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 1684.237424][ T1072] oom_reaper: reaped process 22564 (syz-executor.5), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB 00:14:39 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r7, 0x0, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r6, 0x0, 0x0) 00:14:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xffffffff, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) 00:14:39 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r5, 0x0, 0x0) 00:14:39 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:14:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="c00000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:14:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="250000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1684.395857][T22550] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1684.443215][T22550] CPU: 0 PID: 22550 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 1684.451325][T22550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1684.455428][T22576] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1684.461392][T22550] Call Trace: [ 1684.461415][T22550] dump_stack+0x172/0x1f0 [ 1684.461435][T22550] dump_header+0x10b/0x82d [ 1684.461445][T22550] ? oom_kill_process+0x94/0x3f0 [ 1684.461465][T22550] oom_kill_process.cold+0x10/0x15 [ 1684.492995][T22550] out_of_memory+0x334/0x1340 [ 1684.497798][T22550] ? lock_downgrade+0x920/0x920 [ 1684.502674][T22550] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 1684.508507][T22550] ? oom_killer_disable+0x280/0x280 [ 1684.513738][T22550] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1684.519298][T22550] ? memcg_stat_show+0xc40/0xc40 [ 1684.524254][T22550] ? do_raw_spin_unlock+0x57/0x270 [ 1684.529393][T22550] ? _raw_spin_unlock+0x2d/0x50 [ 1684.534782][T22550] try_charge+0xf4b/0x1440 [ 1684.534806][T22550] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1684.545083][T22550] ? percpu_ref_tryget_live+0x111/0x290 [ 1684.545104][T22550] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1684.545119][T22550] ? __kasan_check_read+0x11/0x20 [ 1684.545136][T22550] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1684.545153][T22550] mem_cgroup_try_charge+0x136/0x590 [ 1684.545174][T22550] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1684.545193][T22550] __handle_mm_fault+0x1f0d/0x4040 [ 1684.545214][T22550] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1684.545230][T22550] ? handle_mm_fault+0x292/0xaa0 [ 1684.545295][T22550] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1684.595208][T22550] ? __kasan_check_read+0x11/0x20 [ 1684.595229][T22550] handle_mm_fault+0x3b7/0xaa0 [ 1684.595255][T22550] __do_page_fault+0x536/0xdd0 [ 1684.616622][T22550] do_page_fault+0x38/0x590 [ 1684.621142][T22550] page_fault+0x39/0x40 [ 1684.625309][T22550] RIP: 0033:0x43248c [ 1684.629365][T22550] Code: 8b 18 48 85 db 74 0c 8b 43 04 83 e0 04 0f 84 93 00 00 00 e8 16 97 ff ff 48 85 c0 48 89 c3 0f 84 ba 00 00 00 48 89 ee 48 89 df df da ff ff 48 85 c0 48 89 c2 0f 84 cb 00 00 00 83 3d a4 42 64 [ 1684.649016][T22550] RSP: 002b:00007ffe65470000 EFLAGS: 00010246 [ 1684.649029][T22550] RAX: 0000000000000000 RBX: 0000000000716640 RCX: 0000000000458dc4 [ 1684.649037][T22550] RDX: 00007ffe65470020 RSI: 0000000000008030 RDI: 0000000000716640 [ 1684.649044][T22550] RBP: 0000000000008030 R08: 0000000000000001 R09: 0000000001cf6940 00:14:40 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:14:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="b30100002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1684.649051][T22550] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe65471200 [ 1684.649058][T22550] R13: 00007ffe654711f0 R14: 0000000000000000 R15: 00007ffe65471200 [ 1684.832158][T22550] memory: usage 904kB, limit 0kB, failcnt 738 [ 1684.838543][T22550] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1684.872102][T22550] Memory cgroup stats for /syz5: [ 1684.872211][T22550] anon 155648 [ 1684.872211][T22550] file 12288 [ 1684.872211][T22550] kernel_stack 0 [ 1684.872211][T22550] slab 937984 [ 1684.872211][T22550] sock 0 [ 1684.872211][T22550] shmem 0 [ 1684.872211][T22550] file_mapped 0 [ 1684.872211][T22550] file_dirty 0 [ 1684.872211][T22550] file_writeback 0 [ 1684.872211][T22550] anon_thp 0 [ 1684.872211][T22550] inactive_anon 0 [ 1684.872211][T22550] active_anon 155648 [ 1684.872211][T22550] inactive_file 0 [ 1684.872211][T22550] active_file 0 [ 1684.872211][T22550] unevictable 0 [ 1684.872211][T22550] slab_reclaimable 135168 00:14:40 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1684.872211][T22550] slab_unreclaimable 802816 [ 1684.872211][T22550] pgfault 28050 [ 1684.872211][T22550] pgmajfault 0 [ 1684.872211][T22550] workingset_refault 0 [ 1684.872211][T22550] workingset_activate 0 [ 1684.872211][T22550] workingset_nodereclaim 0 [ 1684.872211][T22550] pgrefill 33 [ 1684.872211][T22550] pgscan 33 [ 1684.872211][T22550] pgsteal 0 [ 1684.872211][T22550] pgactivate 0 00:14:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="c00e00002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1685.302541][T22550] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=22550,uid=0 [ 1685.318553][T22575] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 00:14:40 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1685.344701][T22550] Memory cgroup out of memory: Killed process 22550 (syz-executor.5) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 [ 1685.383152][ T1072] oom_reaper: reaped process 22550 (syz-executor.5), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 00:14:40 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1685.492883][T22571] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.2'. 00:14:41 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r7, 0x0, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r6, 0x0, 0x0) 00:14:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xffffffff, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1686.187802][T22611] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1686.414557][T22615] IPVS: ftp: loaded support on port[0] = 21 [ 1686.835605][T22615] chnl_net:caif_netlink_parms(): no params data found [ 1686.884433][T22615] bridge0: port 1(bridge_slave_0) entered blocking state [ 1686.891876][T22615] bridge0: port 1(bridge_slave_0) entered disabled state [ 1686.901226][T22615] device bridge_slave_0 entered promiscuous mode [ 1686.977952][T22615] bridge0: port 2(bridge_slave_1) entered blocking state [ 1686.987107][T22615] bridge0: port 2(bridge_slave_1) entered disabled state [ 1686.996323][T22615] device bridge_slave_1 entered promiscuous mode [ 1687.025387][T22615] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1687.137312][T22615] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1687.165097][T22615] team0: Port device team_slave_0 added [ 1687.173924][T22615] team0: Port device team_slave_1 added [ 1687.275602][T22615] device hsr_slave_0 entered promiscuous mode [ 1687.332898][T22615] device hsr_slave_1 entered promiscuous mode [ 1687.412257][T22615] debugfs: Directory 'hsr0' with parent '/' already present! [ 1687.544386][T22615] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1687.564197][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1687.576649][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1687.587001][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1687.600088][T22615] 8021q: adding VLAN 0 to HW filter on device team0 [ 1687.654666][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1687.665290][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1687.674256][ T2851] bridge0: port 1(bridge_slave_0) entered blocking state [ 1687.681431][ T2851] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1687.705766][T22358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1687.714671][T22358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1687.724613][T22358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1687.734533][T22358] bridge0: port 2(bridge_slave_1) entered blocking state [ 1687.741604][T22358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1687.806232][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1687.815905][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1687.825700][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1687.836077][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1687.850846][T22615] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1687.863498][T22615] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1687.928225][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1687.957432][T22615] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1688.174415][T22626] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1688.184791][T22626] CPU: 0 PID: 22626 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 1688.192855][T22626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1688.202910][T22626] Call Trace: [ 1688.206208][T22626] dump_stack+0x172/0x1f0 [ 1688.210547][T22626] dump_header+0x10b/0x82d [ 1688.214969][T22626] oom_kill_process.cold+0x10/0x15 [ 1688.220093][T22626] out_of_memory+0x334/0x1340 [ 1688.224770][T22626] ? __sched_text_start+0x8/0x8 [ 1688.229614][T22626] ? oom_killer_disable+0x280/0x280 [ 1688.234809][T22626] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1688.240594][T22626] ? memcg_stat_show+0xc40/0xc40 [ 1688.245515][T22626] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1688.251326][T22626] ? cgroup_file_notify+0x140/0x1b0 [ 1688.256508][T22626] memory_max_write+0x262/0x3a0 [ 1688.261341][T22626] ? mem_cgroup_write+0x370/0x370 [ 1688.266360][T22626] ? lock_acquire+0x190/0x410 [ 1688.271018][T22626] ? kernfs_fop_write+0x227/0x480 [ 1688.276033][T22626] cgroup_file_write+0x241/0x790 [ 1688.280952][T22626] ? mem_cgroup_write+0x370/0x370 [ 1688.285961][T22626] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1688.291577][T22626] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1688.297190][T22626] kernfs_fop_write+0x2b8/0x480 [ 1688.302035][T22626] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1688.308257][T22626] __vfs_write+0x8a/0x110 [ 1688.312567][T22626] ? kernfs_fop_open+0xd80/0xd80 [ 1688.317498][T22626] vfs_write+0x268/0x5d0 [ 1688.321728][T22626] ksys_write+0x14f/0x290 [ 1688.326036][T22626] ? __ia32_sys_read+0xb0/0xb0 [ 1688.330778][T22626] ? do_syscall_64+0x26/0x760 [ 1688.335448][T22626] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1688.341602][T22626] ? do_syscall_64+0x26/0x760 [ 1688.346304][T22626] __x64_sys_write+0x73/0xb0 [ 1688.350936][T22626] do_syscall_64+0xfa/0x760 [ 1688.355426][T22626] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1688.361309][T22626] RIP: 0033:0x459a59 [ 1688.365195][T22626] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1688.384794][T22626] RSP: 002b:00007fec945a8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1688.393193][T22626] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 1688.401146][T22626] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1688.409096][T22626] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1688.417047][T22626] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fec945a96d4 [ 1688.425011][T22626] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 1688.439445][T22626] memory: usage 3232kB, limit 0kB, failcnt 394 [ 1688.445841][T22626] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1688.452745][T22626] Memory cgroup stats for /syz4: [ 1688.452860][T22626] anon 2187264 [ 1688.452860][T22626] file 40960 [ 1688.452860][T22626] kernel_stack 65536 [ 1688.452860][T22626] slab 835584 [ 1688.452860][T22626] sock 0 [ 1688.452860][T22626] shmem 0 [ 1688.452860][T22626] file_mapped 0 [ 1688.452860][T22626] file_dirty 0 [ 1688.452860][T22626] file_writeback 0 [ 1688.452860][T22626] anon_thp 2097152 [ 1688.452860][T22626] inactive_anon 0 [ 1688.452860][T22626] active_anon 2187264 [ 1688.452860][T22626] inactive_file 131072 [ 1688.452860][T22626] active_file 0 [ 1688.452860][T22626] unevictable 0 [ 1688.452860][T22626] slab_reclaimable 270336 [ 1688.452860][T22626] slab_unreclaimable 565248 [ 1688.452860][T22626] pgfault 37587 [ 1688.452860][T22626] pgmajfault 0 [ 1688.452860][T22626] workingset_refault 0 [ 1688.452860][T22626] workingset_activate 0 [ 1688.452860][T22626] workingset_nodereclaim 0 [ 1688.452860][T22626] pgrefill 69 [ 1688.452860][T22626] pgscan 5378 [ 1688.452860][T22626] pgsteal 5230 [ 1688.452860][T22626] pgactivate 99 [ 1688.550180][T22626] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=22624,uid=0 [ 1688.566687][T22626] Memory cgroup out of memory: Killed process 22624 (syz-executor.4) total-vm:72712kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 1688.586910][ T1072] oom_reaper: reaped process 22624 (syz-executor.4), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB 00:14:43 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r5, 0x0, 0x0) 00:14:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="e03f03002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:14:43 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:14:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="680000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) 00:14:44 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r6, 0x0, 0x0) 00:14:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="c00e00002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1688.729117][T22615] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1688.790845][T22615] CPU: 1 PID: 22615 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 1688.798778][T22615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1688.816832][T22615] Call Trace: [ 1688.820138][T22615] dump_stack+0x172/0x1f0 [ 1688.824494][T22615] dump_header+0x10b/0x82d [ 1688.828920][T22615] ? oom_kill_process+0x94/0x3f0 [ 1688.833885][T22615] oom_kill_process.cold+0x10/0x15 [ 1688.839016][T22615] out_of_memory+0x334/0x1340 [ 1688.843710][T22615] ? lock_downgrade+0x920/0x920 [ 1688.848575][T22615] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 1688.854392][T22615] ? oom_killer_disable+0x280/0x280 [ 1688.859619][T22615] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1688.865180][T22615] ? memcg_stat_show+0xc40/0xc40 [ 1688.870132][T22615] ? do_raw_spin_unlock+0x57/0x270 [ 1688.875263][T22615] ? _raw_spin_unlock+0x2d/0x50 [ 1688.880133][T22615] try_charge+0xf4b/0x1440 [ 1688.884570][T22615] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1688.890130][T22615] ? percpu_ref_tryget_live+0x111/0x290 [ 1688.895694][T22615] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1688.901950][T22615] ? __kasan_check_read+0x11/0x20 [ 1688.906988][T22615] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1688.912529][T22615] mem_cgroup_try_charge+0x136/0x590 [ 1688.912550][T22615] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1688.912566][T22615] __handle_mm_fault+0x1f0d/0x4040 [ 1688.912584][T22615] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1688.912598][T22615] ? handle_mm_fault+0x292/0xaa0 [ 1688.912625][T22615] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1688.912641][T22615] ? __kasan_check_read+0x11/0x20 [ 1688.912662][T22615] handle_mm_fault+0x3b7/0xaa0 [ 1688.955139][T22615] __do_page_fault+0x536/0xdd0 [ 1688.959926][T22615] do_page_fault+0x38/0x590 [ 1688.964441][T22615] page_fault+0x39/0x40 [ 1688.968604][T22615] RIP: 0033:0x403522 00:14:44 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1688.972540][T22615] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 59 8f 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 79 44 05 00 48 [ 1688.992241][T22615] RSP: 002b:00007ffdda556e10 EFLAGS: 00010246 [ 1688.998322][T22615] RAX: 0000000000000000 RBX: 000000000019c36b RCX: 0000000000413660 [ 1689.006330][T22615] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffdda557f40 [ 1689.014320][T22615] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000000001582940 [ 1689.022311][T22615] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdda557f40 [ 1689.030305][T22615] R13: 00007ffdda557f30 R14: 0000000000000000 R15: 00007ffdda557f40 [ 1689.090875][T22615] memory: usage 864kB, limit 0kB, failcnt 402 [ 1689.113137][T22615] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1689.161751][T22615] Memory cgroup stats for /syz4: [ 1689.161860][T22615] anon 77824 [ 1689.161860][T22615] file 40960 [ 1689.161860][T22615] kernel_stack 65536 [ 1689.161860][T22615] slab 835584 [ 1689.161860][T22615] sock 0 [ 1689.161860][T22615] shmem 0 [ 1689.161860][T22615] file_mapped 0 [ 1689.161860][T22615] file_dirty 0 [ 1689.161860][T22615] file_writeback 0 [ 1689.161860][T22615] anon_thp 0 [ 1689.161860][T22615] inactive_anon 0 [ 1689.161860][T22615] active_anon 77824 [ 1689.161860][T22615] inactive_file 131072 00:14:44 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:14:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="ae0000202300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1689.161860][T22615] active_file 0 [ 1689.161860][T22615] unevictable 0 [ 1689.161860][T22615] slab_reclaimable 270336 [ 1689.161860][T22615] slab_unreclaimable 565248 [ 1689.161860][T22615] pgfault 37587 [ 1689.161860][T22615] pgmajfault 0 [ 1689.161860][T22615] workingset_refault 0 [ 1689.161860][T22615] workingset_activate 0 [ 1689.161860][T22615] workingset_nodereclaim 0 [ 1689.161860][T22615] pgrefill 69 [ 1689.161860][T22615] pgscan 5378 [ 1689.161860][T22615] pgsteal 5230 [ 1689.161860][T22615] pgactivate 99 00:14:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="c00000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) 00:14:44 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1689.318980][T22615] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=22615,uid=0 [ 1689.349881][T22615] Memory cgroup out of memory: Killed process 22615 (syz-executor.4) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 00:14:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="c00e00002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1689.452855][ T1072] oom_reaper: reaped process 22615 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 00:14:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r5, 0x0, 0x0) 00:14:45 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:14:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="c00e00002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:14:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="b30100002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1690.475157][T22689] IPVS: ftp: loaded support on port[0] = 21 [ 1690.633668][T22689] chnl_net:caif_netlink_parms(): no params data found [ 1690.857358][T22689] bridge0: port 1(bridge_slave_0) entered blocking state [ 1690.866928][T22689] bridge0: port 1(bridge_slave_0) entered disabled state [ 1690.875863][T22689] device bridge_slave_0 entered promiscuous mode [ 1690.884963][T22689] bridge0: port 2(bridge_slave_1) entered blocking state [ 1690.892566][T22689] bridge0: port 2(bridge_slave_1) entered disabled state [ 1690.900938][T22689] device bridge_slave_1 entered promiscuous mode [ 1691.025219][T22689] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1691.037963][T22689] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1691.118391][T22689] team0: Port device team_slave_0 added [ 1691.126570][T22689] team0: Port device team_slave_1 added [ 1691.186027][T22689] device hsr_slave_0 entered promiscuous mode [ 1691.243098][T22689] device hsr_slave_1 entered promiscuous mode [ 1691.292079][T22689] debugfs: Directory 'hsr0' with parent '/' already present! [ 1691.426118][T22689] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1691.492301][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1691.501074][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1691.514574][T22689] 8021q: adding VLAN 0 to HW filter on device team0 [ 1691.572786][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1691.581679][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1691.593051][T22093] bridge0: port 1(bridge_slave_0) entered blocking state [ 1691.600151][T22093] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1691.622733][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1691.631017][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1691.641615][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1691.650609][T22093] bridge0: port 2(bridge_slave_1) entered blocking state [ 1691.657823][T22093] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1691.667399][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1691.676835][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1691.813208][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1691.824126][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1691.833190][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1691.900459][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1691.919696][T22689] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1691.933460][T22689] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1691.943237][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1692.040493][T22689] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1692.260029][T22697] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1692.272564][T22697] CPU: 1 PID: 22697 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 1692.280469][T22697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1692.290528][T22697] Call Trace: [ 1692.293830][T22697] dump_stack+0x172/0x1f0 [ 1692.298166][T22697] dump_header+0x10b/0x82d [ 1692.302594][T22697] oom_kill_process.cold+0x10/0x15 [ 1692.307708][T22697] out_of_memory+0x334/0x1340 [ 1692.312396][T22697] ? retint_kernel+0x2b/0x2b [ 1692.316988][T22697] ? oom_killer_disable+0x280/0x280 [ 1692.322204][T22697] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1692.327845][T22697] ? memcg_stat_show+0xc40/0xc40 [ 1692.332790][T22697] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1692.338599][T22697] ? cgroup_file_notify+0x140/0x1b0 [ 1692.343807][T22697] memory_max_write+0x262/0x3a0 [ 1692.348666][T22697] ? mem_cgroup_write+0x370/0x370 [ 1692.353710][T22697] ? cgroup_file_write+0x86/0x790 [ 1692.358737][T22697] cgroup_file_write+0x241/0x790 [ 1692.363682][T22697] ? mem_cgroup_write+0x370/0x370 [ 1692.368713][T22697] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1692.374354][T22697] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1692.380026][T22697] kernfs_fop_write+0x2b8/0x480 [ 1692.384892][T22697] __vfs_write+0x8a/0x110 [ 1692.389228][T22697] ? kernfs_fop_open+0xd80/0xd80 [ 1692.394176][T22697] vfs_write+0x268/0x5d0 [ 1692.398426][T22697] ksys_write+0x14f/0x290 [ 1692.402773][T22697] ? __ia32_sys_read+0xb0/0xb0 [ 1692.407541][T22697] ? do_syscall_64+0x26/0x760 [ 1692.412218][T22697] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1692.418283][T22697] ? do_syscall_64+0x26/0x760 [ 1692.422975][T22697] __x64_sys_write+0x73/0xb0 [ 1692.427568][T22697] do_syscall_64+0xfa/0x760 [ 1692.432082][T22697] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1692.437977][T22697] RIP: 0033:0x459a59 [ 1692.441874][T22697] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1692.461483][T22697] RSP: 002b:00007f3717dedc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1692.469907][T22697] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 1692.477884][T22697] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1692.485855][T22697] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1692.493830][T22697] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3717dee6d4 [ 1692.501799][T22697] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 1692.522338][T22697] memory: usage 3216kB, limit 0kB, failcnt 739 [ 1692.529167][T22697] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1692.536508][T22697] Memory cgroup stats for /syz5: [ 1692.537826][T22697] anon 2174976 [ 1692.537826][T22697] file 12288 [ 1692.537826][T22697] kernel_stack 65536 [ 1692.537826][T22697] slab 802816 [ 1692.537826][T22697] sock 0 [ 1692.537826][T22697] shmem 0 [ 1692.537826][T22697] file_mapped 0 [ 1692.537826][T22697] file_dirty 0 [ 1692.537826][T22697] file_writeback 0 [ 1692.537826][T22697] anon_thp 2097152 [ 1692.537826][T22697] inactive_anon 0 [ 1692.537826][T22697] active_anon 2174976 [ 1692.537826][T22697] inactive_file 0 [ 1692.537826][T22697] active_file 0 [ 1692.537826][T22697] unevictable 0 [ 1692.537826][T22697] slab_reclaimable 135168 [ 1692.537826][T22697] slab_unreclaimable 667648 [ 1692.537826][T22697] pgfault 28149 [ 1692.537826][T22697] pgmajfault 0 [ 1692.537826][T22697] workingset_refault 0 [ 1692.537826][T22697] workingset_activate 0 [ 1692.537826][T22697] workingset_nodereclaim 0 [ 1692.537826][T22697] pgrefill 33 [ 1692.537826][T22697] pgscan 33 [ 1692.537826][T22697] pgsteal 0 [ 1692.537826][T22697] pgactivate 0 [ 1692.645088][T22697] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=22695,uid=0 [ 1692.664635][T22697] Memory cgroup out of memory: Killed process 22695 (syz-executor.5) total-vm:72580kB, anon-rss:2144kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 1692.686457][ T1072] oom_reaper: reaped process 22695 (syz-executor.5), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB 00:14:48 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r6, 0x0, 0x0) 00:14:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="00f0ff7f2300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:14:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="c00e00002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) 00:14:48 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:14:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r5, 0x0, 0x0) 00:14:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="ae0000202300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1692.970989][T22689] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1693.016643][T22689] CPU: 0 PID: 22689 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 1693.024569][T22689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1693.034661][T22689] Call Trace: [ 1693.037969][T22689] dump_stack+0x172/0x1f0 [ 1693.042306][T22689] dump_header+0x10b/0x82d [ 1693.046719][T22689] ? oom_kill_process+0x94/0x3f0 [ 1693.051657][T22689] oom_kill_process.cold+0x10/0x15 [ 1693.056786][T22689] out_of_memory+0x334/0x1340 [ 1693.061477][T22689] ? lock_downgrade+0x920/0x920 [ 1693.066348][T22689] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 1693.072167][T22689] ? oom_killer_disable+0x280/0x280 [ 1693.077398][T22689] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1693.082953][T22689] ? memcg_stat_show+0xc40/0xc40 [ 1693.087893][T22689] ? do_raw_spin_unlock+0x57/0x270 [ 1693.093008][T22689] ? _raw_spin_unlock+0x2d/0x50 [ 1693.097868][T22689] try_charge+0xf4b/0x1440 [ 1693.102302][T22689] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1693.107855][T22689] ? percpu_ref_tryget_live+0x111/0x290 [ 1693.113417][T22689] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1693.119670][T22689] ? __kasan_check_read+0x11/0x20 [ 1693.124718][T22689] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1693.130368][T22689] mem_cgroup_try_charge+0x136/0x590 [ 1693.135674][T22689] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1693.141324][T22689] wp_page_copy+0x407/0x1860 [ 1693.145924][T22689] ? find_held_lock+0x35/0x130 [ 1693.150703][T22689] ? do_wp_page+0x53b/0x15c0 [ 1693.155307][T22689] ? pmd_devmap_trans_unstable+0x220/0x220 [ 1693.161126][T22689] ? lock_downgrade+0x920/0x920 [ 1693.165992][T22689] ? swp_swapcount+0x540/0x540 [ 1693.170771][T22689] ? __kasan_check_read+0x11/0x20 [ 1693.175809][T22689] ? do_raw_spin_unlock+0x57/0x270 [ 1693.180935][T22689] do_wp_page+0x543/0x15c0 [ 1693.185364][T22689] ? finish_mkwrite_fault+0x6a0/0x6a0 [ 1693.190755][T22689] __handle_mm_fault+0x23ec/0x4040 [ 1693.195882][T22689] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1693.201439][T22689] ? handle_mm_fault+0x292/0xaa0 [ 1693.206400][T22689] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1693.212664][T22689] ? __kasan_check_read+0x11/0x20 [ 1693.217712][T22689] handle_mm_fault+0x3b7/0xaa0 [ 1693.222494][T22689] __do_page_fault+0x536/0xdd0 [ 1693.227330][T22689] do_page_fault+0x38/0x590 [ 1693.231844][T22689] page_fault+0x39/0x40 [ 1693.236002][T22689] RIP: 0033:0x403522 [ 1693.239912][T22689] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 59 8f 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 79 44 05 00 48 [ 1693.259601][T22689] RSP: 002b:00007ffced26ec50 EFLAGS: 00010246 00:14:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000000f00817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1693.265690][T22689] RAX: 0000000000000000 RBX: 000000000019d22c RCX: 0000000000413660 [ 1693.265698][T22689] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffced26fd80 [ 1693.265705][T22689] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000000001f01940 [ 1693.265712][T22689] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffced26fd80 [ 1693.265720][T22689] R13: 00007ffced26fd70 R14: 0000000000000000 R15: 00007ffced26fd80 00:14:48 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:14:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="140000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:14:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="e03f03002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) 00:14:48 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1693.642249][T22689] memory: usage 892kB, limit 0kB, failcnt 747 [ 1693.648707][T22689] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1693.690568][T22689] Memory cgroup stats for /syz5: [ 1693.690676][T22689] anon 0 [ 1693.690676][T22689] file 12288 [ 1693.690676][T22689] kernel_stack 0 [ 1693.690676][T22689] slab 802816 [ 1693.690676][T22689] sock 0 [ 1693.690676][T22689] shmem 0 [ 1693.690676][T22689] file_mapped 0 [ 1693.690676][T22689] file_dirty 0 [ 1693.690676][T22689] file_writeback 0 [ 1693.690676][T22689] anon_thp 0 [ 1693.690676][T22689] inactive_anon 0 [ 1693.690676][T22689] active_anon 0 [ 1693.690676][T22689] inactive_file 0 [ 1693.690676][T22689] active_file 0 [ 1693.690676][T22689] unevictable 0 [ 1693.690676][T22689] slab_reclaimable 135168 [ 1693.690676][T22689] slab_unreclaimable 667648 [ 1693.690676][T22689] pgfault 28149 [ 1693.690676][T22689] pgmajfault 0 [ 1693.690676][T22689] workingset_refault 0 [ 1693.690676][T22689] workingset_activate 0 [ 1693.690676][T22689] workingset_nodereclaim 0 [ 1693.690676][T22689] pgrefill 33 [ 1693.690676][T22689] pgscan 33 [ 1693.690676][T22689] pgsteal 0 [ 1693.690676][T22689] pgactivate 0 [ 1693.690676][T22689] pgdeactivate 33 [ 1693.791815][T22689] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=22689,uid=0 [ 1693.807892][T22689] Memory cgroup out of memory: Killed process 22689 (syz-executor.5) total-vm:72448kB, anon-rss:76kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 00:14:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0200002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1693.850723][ T1072] oom_reaper: reaped process 22689 (syz-executor.5), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 00:14:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r6, 0x0, 0x0) 00:14:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="ae0000202300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) 00:14:49 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:14:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0300002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1694.911545][T22757] IPVS: ftp: loaded support on port[0] = 21 [ 1695.228323][T22757] chnl_net:caif_netlink_parms(): no params data found [ 1695.274161][T22757] bridge0: port 1(bridge_slave_0) entered blocking state [ 1695.281322][T22757] bridge0: port 1(bridge_slave_0) entered disabled state [ 1695.290183][T22757] device bridge_slave_0 entered promiscuous mode [ 1695.299563][T22757] bridge0: port 2(bridge_slave_1) entered blocking state [ 1695.307218][T22757] bridge0: port 2(bridge_slave_1) entered disabled state [ 1695.316405][T22757] device bridge_slave_1 entered promiscuous mode [ 1695.430032][T22757] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1695.443452][T22757] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1695.468708][T22757] team0: Port device team_slave_0 added [ 1695.480442][T22757] team0: Port device team_slave_1 added [ 1695.605866][T22757] device hsr_slave_0 entered promiscuous mode [ 1695.712724][T22757] device hsr_slave_1 entered promiscuous mode [ 1695.812080][T22757] debugfs: Directory 'hsr0' with parent '/' already present! [ 1695.943667][T22757] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1695.964288][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1695.972858][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1696.029606][T22757] 8021q: adding VLAN 0 to HW filter on device team0 [ 1696.045331][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1696.054964][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1696.065479][T20483] bridge0: port 1(bridge_slave_0) entered blocking state [ 1696.072705][T20483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1696.156482][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1696.164895][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1696.174402][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1696.184403][T12286] bridge0: port 2(bridge_slave_1) entered blocking state [ 1696.191467][T12286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1696.240270][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1696.258119][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1696.268827][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1696.278364][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1696.299537][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1696.308945][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1696.318131][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1696.398122][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1696.408014][T22757] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1696.445198][T22757] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1696.709459][T22767] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1696.719842][T22767] CPU: 1 PID: 22767 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 1696.727757][T22767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1696.737835][T22767] Call Trace: [ 1696.741135][T22767] dump_stack+0x172/0x1f0 [ 1696.745478][T22767] dump_header+0x10b/0x82d [ 1696.749899][T22767] oom_kill_process.cold+0x10/0x15 [ 1696.755026][T22767] out_of_memory+0x334/0x1340 [ 1696.759724][T22767] ? __sched_text_start+0x8/0x8 [ 1696.764589][T22767] ? oom_killer_disable+0x280/0x280 [ 1696.769905][T22767] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1696.775463][T22767] ? memcg_stat_show+0xc40/0xc40 [ 1696.780433][T22767] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1696.786254][T22767] ? cgroup_file_notify+0x140/0x1b0 [ 1696.791463][T22767] memory_max_write+0x262/0x3a0 [ 1696.796319][T22767] ? mem_cgroup_write+0x370/0x370 [ 1696.801345][T22767] ? lock_acquire+0x190/0x410 [ 1696.806045][T22767] ? kernfs_fop_write+0x227/0x480 [ 1696.811163][T22767] cgroup_file_write+0x241/0x790 [ 1696.816100][T22767] ? mem_cgroup_write+0x370/0x370 [ 1696.821138][T22767] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1696.826791][T22767] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1696.832433][T22767] kernfs_fop_write+0x2b8/0x480 [ 1696.837292][T22767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1696.843542][T22767] __vfs_write+0x8a/0x110 [ 1696.847875][T22767] ? kernfs_fop_open+0xd80/0xd80 [ 1696.852818][T22767] vfs_write+0x268/0x5d0 [ 1696.857063][T22767] ksys_write+0x14f/0x290 [ 1696.861425][T22767] ? __ia32_sys_read+0xb0/0xb0 [ 1696.866202][T22767] ? do_syscall_64+0x26/0x760 [ 1696.870881][T22767] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1696.876943][T22767] ? do_syscall_64+0x26/0x760 [ 1696.881634][T22767] __x64_sys_write+0x73/0xb0 [ 1696.886225][T22767] do_syscall_64+0xfa/0x760 [ 1696.890735][T22767] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1696.896622][T22767] RIP: 0033:0x459a59 [ 1696.900524][T22767] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1696.920134][T22767] RSP: 002b:00007feead99fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1696.928569][T22767] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 1696.936648][T22767] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1696.944647][T22767] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1696.952618][T22767] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feead9a06d4 [ 1696.960606][T22767] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 1696.980808][T22767] memory: usage 3280kB, limit 0kB, failcnt 403 [ 1696.988926][T22767] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1696.996390][T22767] Memory cgroup stats for /syz4: [ 1696.996519][T22767] anon 2134016 [ 1696.996519][T22767] file 40960 [ 1696.996519][T22767] kernel_stack 65536 [ 1696.996519][T22767] slab 835584 [ 1696.996519][T22767] sock 0 [ 1696.996519][T22767] shmem 0 [ 1696.996519][T22767] file_mapped 0 [ 1696.996519][T22767] file_dirty 0 [ 1696.996519][T22767] file_writeback 0 [ 1696.996519][T22767] anon_thp 2097152 [ 1696.996519][T22767] inactive_anon 0 [ 1696.996519][T22767] active_anon 2134016 [ 1696.996519][T22767] inactive_file 131072 [ 1696.996519][T22767] active_file 0 [ 1696.996519][T22767] unevictable 0 [ 1696.996519][T22767] slab_reclaimable 270336 [ 1696.996519][T22767] slab_unreclaimable 565248 [ 1696.996519][T22767] pgfault 37653 [ 1696.996519][T22767] pgmajfault 0 [ 1696.996519][T22767] workingset_refault 0 [ 1696.996519][T22767] workingset_activate 0 [ 1696.996519][T22767] workingset_nodereclaim 0 [ 1696.996519][T22767] pgrefill 69 [ 1696.996519][T22767] pgscan 5378 [ 1696.996519][T22767] pgsteal 5230 [ 1696.996519][T22767] pgactivate 99 [ 1697.096451][T22767] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=22765,uid=0 [ 1697.112610][T22767] Memory cgroup out of memory: Killed process 22765 (syz-executor.4) total-vm:72712kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 1697.132863][ T1072] oom_reaper: reaped process 22765 (syz-executor.4), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB [ 1697.209981][T22757] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1697.224602][T22757] CPU: 1 PID: 22757 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 1697.232525][T22757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1697.242613][T22757] Call Trace: [ 1697.245937][T22757] dump_stack+0x172/0x1f0 [ 1697.250296][T22757] dump_header+0x10b/0x82d [ 1697.254719][T22757] ? oom_kill_process+0x94/0x3f0 [ 1697.259670][T22757] oom_kill_process.cold+0x10/0x15 [ 1697.264791][T22757] out_of_memory+0x334/0x1340 [ 1697.269478][T22757] ? lock_downgrade+0x920/0x920 [ 1697.274338][T22757] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 1697.280154][T22757] ? oom_killer_disable+0x280/0x280 [ 1697.285368][T22757] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1697.290924][T22757] ? memcg_stat_show+0xc40/0xc40 [ 1697.295874][T22757] ? do_raw_spin_unlock+0x57/0x270 [ 1697.301000][T22757] ? _raw_spin_unlock+0x2d/0x50 [ 1697.305879][T22757] try_charge+0xf4b/0x1440 [ 1697.310314][T22757] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1697.315882][T22757] ? percpu_ref_tryget_live+0x111/0x290 [ 1697.321441][T22757] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1697.327693][T22757] ? __kasan_check_read+0x11/0x20 [ 1697.332726][T22757] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1697.338288][T22757] mem_cgroup_try_charge+0x136/0x590 [ 1697.343589][T22757] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1697.349236][T22757] wp_page_copy+0x407/0x1860 [ 1697.354094][T22757] ? find_held_lock+0x35/0x130 [ 1697.358866][T22757] ? do_wp_page+0x53b/0x15c0 [ 1697.363503][T22757] ? pmd_devmap_trans_unstable+0x220/0x220 [ 1697.369316][T22757] ? lock_downgrade+0x920/0x920 [ 1697.374176][T22757] ? swp_swapcount+0x540/0x540 [ 1697.378947][T22757] ? __kasan_check_read+0x11/0x20 [ 1697.384009][T22757] ? do_raw_spin_unlock+0x57/0x270 [ 1697.389131][T22757] do_wp_page+0x543/0x15c0 [ 1697.393565][T22757] ? finish_mkwrite_fault+0x6a0/0x6a0 [ 1697.398954][T22757] __handle_mm_fault+0x23ec/0x4040 [ 1697.404078][T22757] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1697.409633][T22757] ? handle_mm_fault+0x292/0xaa0 [ 1697.414593][T22757] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1697.420838][T22757] ? __kasan_check_read+0x11/0x20 [ 1697.425881][T22757] handle_mm_fault+0x3b7/0xaa0 [ 1697.430659][T22757] __do_page_fault+0x536/0xdd0 [ 1697.435443][T22757] do_page_fault+0x38/0x590 [ 1697.439971][T22757] page_fault+0x39/0x40 [ 1697.444131][T22757] RIP: 0033:0x430b36 [ 1697.448029][T22757] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 44 64 00 85 c0 0f 84 [ 1697.467644][T22757] RSP: 002b:00007ffd64bb5840 EFLAGS: 00010206 [ 1697.473720][T22757] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1697.481699][T22757] RDX: 0000000000ea7930 RSI: 0000000000eaf970 RDI: 0000000000000003 [ 1697.489681][T22757] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000000ea6940 [ 1697.497661][T22757] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 00:14:52 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r5, 0x0, 0x0) 00:14:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="140000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:14:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r6, 0x0, 0x0) 00:14:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0400002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:14:52 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:14:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="00f0ff7f2300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1697.505644][T22757] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 [ 1697.522497][T22757] memory: usage 912kB, limit 0kB, failcnt 415 [ 1697.529962][T22757] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1697.549797][T22757] Memory cgroup stats for /syz4: [ 1697.549905][T22757] anon 53248 [ 1697.549905][T22757] file 40960 [ 1697.549905][T22757] kernel_stack 0 [ 1697.549905][T22757] slab 835584 [ 1697.549905][T22757] sock 0 [ 1697.549905][T22757] shmem 0 [ 1697.549905][T22757] file_mapped 0 [ 1697.549905][T22757] file_dirty 0 [ 1697.549905][T22757] file_writeback 0 [ 1697.549905][T22757] anon_thp 0 [ 1697.549905][T22757] inactive_anon 0 [ 1697.549905][T22757] active_anon 53248 [ 1697.549905][T22757] inactive_file 131072 [ 1697.549905][T22757] active_file 0 [ 1697.549905][T22757] unevictable 0 [ 1697.549905][T22757] slab_reclaimable 270336 [ 1697.549905][T22757] slab_unreclaimable 565248 [ 1697.549905][T22757] pgfault 37653 [ 1697.549905][T22757] pgmajfault 0 [ 1697.549905][T22757] workingset_refault 0 [ 1697.549905][T22757] workingset_activate 0 [ 1697.549905][T22757] workingset_nodereclaim 0 [ 1697.549905][T22757] pgrefill 69 [ 1697.549905][T22757] pgscan 5378 [ 1697.549905][T22757] pgsteal 5230 [ 1697.549905][T22757] pgactivate 99 00:14:53 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:14:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0500002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1697.748109][T22757] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=22757,uid=0 [ 1697.777834][T22757] Memory cgroup out of memory: Killed process 22757 (syz-executor.4) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 00:14:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000000f00817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1697.815790][ T1072] oom_reaper: reaped process 22757 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 00:14:53 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:14:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="140000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:14:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0200002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) 00:14:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r5, 0x0, 0x0) 00:14:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0600002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1698.890839][T22816] IPVS: ftp: loaded support on port[0] = 21 [ 1699.357552][T22816] chnl_net:caif_netlink_parms(): no params data found [ 1699.447517][T22816] bridge0: port 1(bridge_slave_0) entered blocking state [ 1699.455713][T22816] bridge0: port 1(bridge_slave_0) entered disabled state [ 1699.464493][T22816] device bridge_slave_0 entered promiscuous mode [ 1699.473606][T22816] bridge0: port 2(bridge_slave_1) entered blocking state [ 1699.480731][T22816] bridge0: port 2(bridge_slave_1) entered disabled state [ 1699.489766][T22816] device bridge_slave_1 entered promiscuous mode [ 1699.560929][T22816] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1699.575073][T22816] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1699.604485][T22816] team0: Port device team_slave_0 added [ 1699.612818][T22816] team0: Port device team_slave_1 added [ 1699.795503][T22816] device hsr_slave_0 entered promiscuous mode [ 1699.892743][T22816] device hsr_slave_1 entered promiscuous mode [ 1699.942389][T22816] debugfs: Directory 'hsr0' with parent '/' already present! [ 1700.112072][T22816] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1700.130274][T22358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1700.139340][T22358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1700.211483][T22816] 8021q: adding VLAN 0 to HW filter on device team0 [ 1700.226266][T22358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1700.235799][T22358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1700.245099][T22358] bridge0: port 1(bridge_slave_0) entered blocking state [ 1700.252236][T22358] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1700.313042][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1700.321460][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1700.330813][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1700.339393][T22357] bridge0: port 2(bridge_slave_1) entered blocking state [ 1700.346485][T22357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1700.356917][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1700.366258][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1700.427708][T22358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1700.437169][T22358] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1700.456892][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1700.467121][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1700.476967][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1700.486409][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1700.495529][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1700.509164][T22816] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1700.521407][T22816] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1700.575263][T22358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1700.593901][T22358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1700.626720][T22816] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1700.974920][T22830] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1700.985583][T22830] CPU: 0 PID: 22830 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 1700.993486][T22830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1701.004150][T22830] Call Trace: [ 1701.007448][T22830] dump_stack+0x172/0x1f0 [ 1701.011787][T22830] dump_header+0x10b/0x82d [ 1701.016209][T22830] oom_kill_process.cold+0x10/0x15 [ 1701.021324][T22830] out_of_memory+0x334/0x1340 [ 1701.026002][T22830] ? __sched_text_start+0x8/0x8 [ 1701.030853][T22830] ? oom_killer_disable+0x280/0x280 [ 1701.036052][T22830] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1701.041577][T22830] ? memcg_stat_show+0xc40/0xc40 [ 1701.046514][T22830] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1701.052308][T22830] ? cgroup_file_notify+0x140/0x1b0 [ 1701.057500][T22830] memory_max_write+0x262/0x3a0 [ 1701.062422][T22830] ? mem_cgroup_write+0x370/0x370 [ 1701.067430][T22830] ? lock_acquire+0x20b/0x410 [ 1701.072105][T22830] cgroup_file_write+0x241/0x790 [ 1701.077035][T22830] ? mem_cgroup_write+0x370/0x370 [ 1701.082039][T22830] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1701.087658][T22830] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1701.093273][T22830] kernfs_fop_write+0x2b8/0x480 [ 1701.098103][T22830] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1701.104321][T22830] __vfs_write+0x8a/0x110 [ 1701.108646][T22830] ? kernfs_fop_open+0xd80/0xd80 [ 1701.113565][T22830] vfs_write+0x268/0x5d0 [ 1701.117793][T22830] ksys_write+0x14f/0x290 [ 1701.122104][T22830] ? __ia32_sys_read+0xb0/0xb0 [ 1701.126861][T22830] __x64_sys_write+0x73/0xb0 [ 1701.131435][T22830] do_syscall_64+0xfa/0x760 [ 1701.135920][T22830] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1701.141785][T22830] RIP: 0033:0x459a59 [ 1701.145660][T22830] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1701.165257][T22830] RSP: 002b:00007fec7b57ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1701.173662][T22830] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 1701.181611][T22830] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1701.189661][T22830] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1701.198231][T22830] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fec7b57b6d4 [ 1701.206204][T22830] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 1701.242509][T22830] memory: usage 3284kB, limit 0kB, failcnt 748 [ 1701.248936][T22830] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1701.256080][T22830] Memory cgroup stats for /syz5: [ 1701.257215][T22830] anon 2068480 [ 1701.257215][T22830] file 12288 [ 1701.257215][T22830] kernel_stack 0 [ 1701.257215][T22830] slab 802816 [ 1701.257215][T22830] sock 0 [ 1701.257215][T22830] shmem 0 [ 1701.257215][T22830] file_mapped 0 [ 1701.257215][T22830] file_dirty 0 [ 1701.257215][T22830] file_writeback 0 [ 1701.257215][T22830] anon_thp 2097152 [ 1701.257215][T22830] inactive_anon 0 [ 1701.257215][T22830] active_anon 2068480 [ 1701.257215][T22830] inactive_file 0 [ 1701.257215][T22830] active_file 0 [ 1701.257215][T22830] unevictable 0 [ 1701.257215][T22830] slab_reclaimable 135168 [ 1701.257215][T22830] slab_unreclaimable 667648 [ 1701.257215][T22830] pgfault 28182 [ 1701.257215][T22830] pgmajfault 0 [ 1701.257215][T22830] workingset_refault 0 [ 1701.257215][T22830] workingset_activate 0 [ 1701.257215][T22830] workingset_nodereclaim 0 [ 1701.257215][T22830] pgrefill 33 [ 1701.257215][T22830] pgscan 33 [ 1701.257215][T22830] pgsteal 0 [ 1701.257215][T22830] pgactivate 0 [ 1701.355298][T22830] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=22829,uid=0 [ 1701.382221][T22830] Memory cgroup out of memory: Killed process 22829 (syz-executor.5) total-vm:72580kB, anon-rss:2136kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:1000 [ 1701.404110][ T1072] oom_reaper: reaped process 22829 (syz-executor.5), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB 00:14:56 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r6, 0x0, 0x0) 00:14:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0300002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) 00:14:56 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r5, 0x0, 0x0) 00:14:56 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)=@isdn={0x22, 0x400, 0x100000000, 0x1f06, 0x1}, 0x80, &(0x7f0000000340)}, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r6, 0x0, 0x0) 00:14:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0700002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:14:56 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1701.486465][T22816] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1701.534799][T22816] CPU: 0 PID: 22816 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 1701.542731][T22816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1701.552780][T22816] Call Trace: [ 1701.552801][T22816] dump_stack+0x172/0x1f0 [ 1701.552818][T22816] dump_header+0x10b/0x82d [ 1701.552830][T22816] ? oom_kill_process+0x94/0x3f0 [ 1701.552844][T22816] oom_kill_process.cold+0x10/0x15 [ 1701.552861][T22816] out_of_memory+0x334/0x1340 [ 1701.579631][T22816] ? lock_downgrade+0x920/0x920 [ 1701.584497][T22816] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 1701.590310][T22816] ? oom_killer_disable+0x280/0x280 [ 1701.595527][T22816] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1701.601082][T22816] ? memcg_stat_show+0xc40/0xc40 [ 1701.606028][T22816] ? do_raw_spin_unlock+0x57/0x270 [ 1701.611138][T22816] ? _raw_spin_unlock+0x2d/0x50 [ 1701.611157][T22816] try_charge+0xf4b/0x1440 [ 1701.611179][T22816] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1701.625980][T22816] ? percpu_ref_tryget_live+0x111/0x290 [ 1701.631540][T22816] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1701.637789][T22816] ? __kasan_check_read+0x11/0x20 [ 1701.642914][T22816] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1701.648477][T22816] mem_cgroup_try_charge+0x136/0x590 [ 1701.653794][T22816] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1701.659446][T22816] wp_page_copy+0x407/0x1860 [ 1701.664040][T22816] ? find_held_lock+0x35/0x130 [ 1701.664058][T22816] ? do_wp_page+0x53b/0x15c0 [ 1701.664078][T22816] ? pmd_devmap_trans_unstable+0x220/0x220 [ 1701.679233][T22816] ? lock_downgrade+0x920/0x920 [ 1701.679253][T22816] ? swp_swapcount+0x540/0x540 [ 1701.679271][T22816] ? __kasan_check_read+0x11/0x20 [ 1701.693866][T22816] ? do_raw_spin_unlock+0x57/0x270 [ 1701.698994][T22816] do_wp_page+0x543/0x15c0 [ 1701.703428][T22816] ? finish_mkwrite_fault+0x6a0/0x6a0 [ 1701.708820][T22816] __handle_mm_fault+0x23ec/0x4040 [ 1701.713942][T22816] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1701.719926][T22816] ? handle_mm_fault+0x292/0xaa0 [ 1701.724886][T22816] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1701.731135][T22816] ? __kasan_check_read+0x11/0x20 [ 1701.736170][T22816] handle_mm_fault+0x3b7/0xaa0 [ 1701.736191][T22816] __do_page_fault+0x536/0xdd0 [ 1701.736213][T22816] do_page_fault+0x38/0x590 [ 1701.750220][T22816] page_fault+0x39/0x40 [ 1701.750233][T22816] RIP: 0033:0x430b36 [ 1701.750245][T22816] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 44 64 00 85 c0 0f 84 [ 1701.750257][T22816] RSP: 002b:00007ffe9a9b2180 EFLAGS: 00010206 [ 1701.783923][T22816] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1701.783932][T22816] RDX: 0000000000b26930 RSI: 0000000000b2e970 RDI: 0000000000000003 [ 1701.783941][T22816] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000000b25940 [ 1701.783950][T22816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1701.783958][T22816] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 00:14:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0400002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) 00:14:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0a00002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:14:57 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:14:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xfffff000, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1702.092196][T22816] memory: usage 968kB, limit 0kB, failcnt 756 [ 1702.098304][T22816] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1702.118471][T22816] Memory cgroup stats for /syz5: [ 1702.118577][T22816] anon 0 [ 1702.118577][T22816] file 12288 [ 1702.118577][T22816] kernel_stack 0 [ 1702.118577][T22816] slab 802816 [ 1702.118577][T22816] sock 0 [ 1702.118577][T22816] shmem 0 [ 1702.118577][T22816] file_mapped 0 [ 1702.118577][T22816] file_dirty 0 [ 1702.118577][T22816] file_writeback 0 [ 1702.118577][T22816] anon_thp 0 [ 1702.118577][T22816] inactive_anon 0 [ 1702.118577][T22816] active_anon 0 [ 1702.118577][T22816] inactive_file 0 [ 1702.118577][T22816] active_file 0 [ 1702.118577][T22816] unevictable 0 [ 1702.118577][T22816] slab_reclaimable 135168 [ 1702.118577][T22816] slab_unreclaimable 667648 [ 1702.118577][T22816] pgfault 28182 [ 1702.118577][T22816] pgmajfault 0 [ 1702.118577][T22816] workingset_refault 0 [ 1702.118577][T22816] workingset_activate 0 [ 1702.118577][T22816] workingset_nodereclaim 0 [ 1702.118577][T22816] pgrefill 33 [ 1702.118577][T22816] pgscan 33 [ 1702.118577][T22816] pgsteal 0 [ 1702.118577][T22816] pgactivate 0 [ 1702.118577][T22816] pgdeactivate 33 00:14:57 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:14:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0500002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1702.404496][T22859] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1702.592465][T22816] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=22816,uid=0 [ 1702.633263][T22816] Memory cgroup out of memory: Killed process 22816 (syz-executor.5) total-vm:72448kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:118784kB oom_score_adj:0 00:14:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r6, 0x0, 0x0) 00:14:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0e00002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1703.250631][T22880] IPVS: ftp: loaded support on port[0] = 21 [ 1703.613352][T22880] chnl_net:caif_netlink_parms(): no params data found [ 1703.649562][T22880] bridge0: port 1(bridge_slave_0) entered blocking state [ 1703.657346][T22880] bridge0: port 1(bridge_slave_0) entered disabled state [ 1703.665819][T22880] device bridge_slave_0 entered promiscuous mode [ 1703.718441][T22880] bridge0: port 2(bridge_slave_1) entered blocking state [ 1703.726692][T22880] bridge0: port 2(bridge_slave_1) entered disabled state [ 1703.735508][T22880] device bridge_slave_1 entered promiscuous mode [ 1703.774232][T22880] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1703.890987][T22880] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1703.918041][T22880] team0: Port device team_slave_0 added [ 1703.974929][T22880] team0: Port device team_slave_1 added [ 1704.043435][T22880] device hsr_slave_0 entered promiscuous mode [ 1704.083112][T22880] device hsr_slave_1 entered promiscuous mode [ 1704.132247][T22880] debugfs: Directory 'hsr0' with parent '/' already present! [ 1704.236629][T22880] bridge0: port 2(bridge_slave_1) entered blocking state [ 1704.243850][T22880] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1704.251217][T22880] bridge0: port 1(bridge_slave_0) entered blocking state [ 1704.258596][T22880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1704.303679][T20483] bridge0: port 1(bridge_slave_0) entered disabled state [ 1704.314251][T20483] bridge0: port 2(bridge_slave_1) entered disabled state [ 1704.421550][T22880] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1704.486081][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1704.494703][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1704.507686][T22880] 8021q: adding VLAN 0 to HW filter on device team0 [ 1704.570210][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1704.579816][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1704.589453][T20483] bridge0: port 1(bridge_slave_0) entered blocking state [ 1704.596613][T20483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1704.615352][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1704.624898][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1704.633863][T12286] bridge0: port 2(bridge_slave_1) entered blocking state [ 1704.640918][T12286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1704.650565][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1704.725253][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1704.741930][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1704.752237][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1704.761142][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1704.770840][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1704.855325][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1704.863915][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1704.873229][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1704.888025][T22880] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1704.900467][T22880] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1704.911055][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1704.922568][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1705.033721][T22880] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1705.316315][T22893] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1705.326697][T22893] CPU: 1 PID: 22893 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 1705.334593][T22893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1705.344650][T22893] Call Trace: [ 1705.347950][T22893] dump_stack+0x172/0x1f0 [ 1705.352300][T22893] dump_header+0x10b/0x82d [ 1705.356724][T22893] oom_kill_process.cold+0x10/0x15 [ 1705.361842][T22893] out_of_memory+0x334/0x1340 [ 1705.366521][T22893] ? __sched_text_start+0x8/0x8 [ 1705.371373][T22893] ? oom_killer_disable+0x280/0x280 [ 1705.376602][T22893] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1705.382161][T22893] ? memcg_stat_show+0xc40/0xc40 [ 1705.387111][T22893] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1705.392916][T22893] ? cgroup_file_notify+0x140/0x1b0 [ 1705.398113][T22893] memory_max_write+0x262/0x3a0 [ 1705.402964][T22893] ? mem_cgroup_write+0x370/0x370 [ 1705.407985][T22893] ? lock_acquire+0x190/0x410 [ 1705.412661][T22893] ? kernfs_fop_write+0x227/0x480 [ 1705.417691][T22893] cgroup_file_write+0x241/0x790 [ 1705.422632][T22893] ? mem_cgroup_write+0x370/0x370 [ 1705.427660][T22893] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1705.433305][T22893] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1705.438937][T22893] kernfs_fop_write+0x2b8/0x480 [ 1705.443789][T22893] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1705.450027][T22893] __vfs_write+0x8a/0x110 [ 1705.454355][T22893] ? kernfs_fop_open+0xd80/0xd80 [ 1705.459294][T22893] vfs_write+0x268/0x5d0 [ 1705.463537][T22893] ksys_write+0x14f/0x290 [ 1705.467952][T22893] ? __ia32_sys_read+0xb0/0xb0 [ 1705.472718][T22893] ? do_syscall_64+0x26/0x760 [ 1705.477395][T22893] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1705.483472][T22893] ? do_syscall_64+0x26/0x760 [ 1705.488154][T22893] __x64_sys_write+0x73/0xb0 [ 1705.492746][T22893] do_syscall_64+0xfa/0x760 [ 1705.497256][T22893] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1705.503142][T22893] RIP: 0033:0x459a59 [ 1705.507034][T22893] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1705.526810][T22893] RSP: 002b:00007f9b40490c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1705.535329][T22893] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 1705.543301][T22893] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1705.551271][T22893] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1705.559278][T22893] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9b404916d4 [ 1705.567259][T22893] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 1705.590003][T22893] memory: usage 3304kB, limit 0kB, failcnt 416 [ 1705.596394][T22893] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1705.603808][T22893] Memory cgroup stats for /syz4: [ 1705.603918][T22893] anon 2142208 [ 1705.603918][T22893] file 40960 [ 1705.603918][T22893] kernel_stack 65536 [ 1705.603918][T22893] slab 835584 [ 1705.603918][T22893] sock 0 [ 1705.603918][T22893] shmem 0 [ 1705.603918][T22893] file_mapped 0 [ 1705.603918][T22893] file_dirty 0 [ 1705.603918][T22893] file_writeback 0 [ 1705.603918][T22893] anon_thp 2097152 [ 1705.603918][T22893] inactive_anon 0 [ 1705.603918][T22893] active_anon 2142208 [ 1705.603918][T22893] inactive_file 131072 [ 1705.603918][T22893] active_file 0 [ 1705.603918][T22893] unevictable 0 [ 1705.603918][T22893] slab_reclaimable 270336 [ 1705.603918][T22893] slab_unreclaimable 565248 [ 1705.603918][T22893] pgfault 37752 [ 1705.603918][T22893] pgmajfault 0 [ 1705.603918][T22893] workingset_refault 0 [ 1705.603918][T22893] workingset_activate 0 [ 1705.603918][T22893] workingset_nodereclaim 0 [ 1705.603918][T22893] pgrefill 69 [ 1705.603918][T22893] pgscan 5378 [ 1705.603918][T22893] pgsteal 5230 [ 1705.603918][T22893] pgactivate 99 [ 1705.704976][T22893] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=22891,uid=0 [ 1705.721378][T22893] Memory cgroup out of memory: Killed process 22891 (syz-executor.4) total-vm:72712kB, anon-rss:2136kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 1705.741219][ T1072] oom_reaper: reaped process 22891 (syz-executor.4), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB 00:15:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r5, 0x0, 0x0) 00:15:01 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:15:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xfffff000, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) 00:15:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)}, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r6, 0x0, 0x0) 00:15:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0f00002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:15:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0600002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1705.879070][T22880] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1705.907878][T22880] CPU: 1 PID: 22880 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 1705.915805][T22880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1705.925869][T22880] Call Trace: [ 1705.929175][T22880] dump_stack+0x172/0x1f0 [ 1705.933518][T22880] dump_header+0x10b/0x82d [ 1705.937945][T22880] ? oom_kill_process+0x94/0x3f0 [ 1705.942894][T22880] oom_kill_process.cold+0x10/0x15 [ 1705.948117][T22880] out_of_memory+0x334/0x1340 [ 1705.952806][T22880] ? lock_downgrade+0x920/0x920 [ 1705.957681][T22880] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 1705.963493][T22880] ? oom_killer_disable+0x280/0x280 [ 1705.968883][T22880] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1705.974436][T22880] ? memcg_stat_show+0xc40/0xc40 [ 1705.979489][T22880] ? do_raw_spin_unlock+0x57/0x270 [ 1705.984725][T22880] ? _raw_spin_unlock+0x2d/0x50 [ 1705.989588][T22880] try_charge+0xf4b/0x1440 [ 1705.994028][T22880] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1705.999602][T22880] ? percpu_ref_tryget_live+0x111/0x290 [ 1706.005158][T22880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1706.011408][T22880] ? __kasan_check_read+0x11/0x20 [ 1706.016448][T22880] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1706.021998][T22880] mem_cgroup_try_charge+0x136/0x590 [ 1706.027297][T22880] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1706.032950][T22880] __handle_mm_fault+0x1f0d/0x4040 [ 1706.038080][T22880] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1706.043637][T22880] ? handle_mm_fault+0x292/0xaa0 [ 1706.048603][T22880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1706.054872][T22880] ? __kasan_check_read+0x11/0x20 [ 1706.059909][T22880] handle_mm_fault+0x3b7/0xaa0 [ 1706.064687][T22880] __do_page_fault+0x536/0xdd0 [ 1706.069463][T22880] do_page_fault+0x38/0x590 [ 1706.074061][T22880] page_fault+0x39/0x40 [ 1706.078223][T22880] RIP: 0033:0x403522 [ 1706.082124][T22880] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 59 8f 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 79 44 05 00 48 [ 1706.101736][T22880] RSP: 002b:00007fff34af7f10 EFLAGS: 00010246 [ 1706.107816][T22880] RAX: 0000000000000000 RBX: 00000000001a066f RCX: 0000000000413660 [ 1706.115795][T22880] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007fff34af9040 [ 1706.123775][T22880] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000000001177940 [ 1706.131779][T22880] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff34af9040 [ 1706.139764][T22880] R13: 00007fff34af9030 R14: 0000000000000000 R15: 00007fff34af9040 [ 1706.163528][T22880] memory: usage 940kB, limit 0kB, failcnt 432 00:15:01 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1706.175036][T22880] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1706.216233][T22880] Memory cgroup stats for /syz4: [ 1706.216344][T22880] anon 53248 [ 1706.216344][T22880] file 40960 [ 1706.216344][T22880] kernel_stack 0 [ 1706.216344][T22880] slab 835584 [ 1706.216344][T22880] sock 0 [ 1706.216344][T22880] shmem 0 [ 1706.216344][T22880] file_mapped 0 [ 1706.216344][T22880] file_dirty 0 [ 1706.216344][T22880] file_writeback 0 [ 1706.216344][T22880] anon_thp 0 [ 1706.216344][T22880] inactive_anon 0 [ 1706.216344][T22880] active_anon 53248 [ 1706.216344][T22880] inactive_file 131072 [ 1706.216344][T22880] active_file 0 [ 1706.216344][T22880] unevictable 0 [ 1706.216344][T22880] slab_reclaimable 270336 [ 1706.216344][T22880] slab_unreclaimable 565248 [ 1706.216344][T22880] pgfault 37752 [ 1706.216344][T22880] pgmajfault 0 [ 1706.216344][T22880] workingset_refault 0 [ 1706.216344][T22880] workingset_activate 0 [ 1706.216344][T22880] workingset_nodereclaim 0 [ 1706.216344][T22880] pgrefill 69 [ 1706.216344][T22880] pgscan 5378 [ 1706.216344][T22880] pgsteal 5230 [ 1706.216344][T22880] pgactivate 99 [ 1706.318548][T22902] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1706.350822][T22880] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=22880,uid=0 00:15:01 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:15:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0700002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1706.378969][T22880] Memory cgroup out of memory: Killed process 22880 (syz-executor.4) total-vm:72448kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 [ 1706.437516][ T1072] oom_reaper: reaped process 22880 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 00:15:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e4800002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:15:02 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:15:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0a00002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) 00:15:02 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r5, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r5, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r4, 0x0, 0x0) 00:15:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e4c00002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:15:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0d00002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1707.708510][T22950] IPVS: ftp: loaded support on port[0] = 21 [ 1707.916138][T22950] chnl_net:caif_netlink_parms(): no params data found [ 1708.074766][T22950] bridge0: port 1(bridge_slave_0) entered blocking state [ 1708.081943][T22950] bridge0: port 1(bridge_slave_0) entered disabled state [ 1708.090650][T22950] device bridge_slave_0 entered promiscuous mode [ 1708.100975][T22950] bridge0: port 2(bridge_slave_1) entered blocking state [ 1708.108386][T22950] bridge0: port 2(bridge_slave_1) entered disabled state [ 1708.117334][T22950] device bridge_slave_1 entered promiscuous mode [ 1708.208812][T22950] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1708.221456][T22950] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1708.249415][T22950] team0: Port device team_slave_0 added [ 1708.353429][T22950] team0: Port device team_slave_1 added [ 1708.415537][T22950] device hsr_slave_0 entered promiscuous mode [ 1708.562945][T22950] device hsr_slave_1 entered promiscuous mode [ 1708.672190][T22950] debugfs: Directory 'hsr0' with parent '/' already present! [ 1709.071323][T22950] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1709.091170][T22358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1709.100111][T22358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1709.114098][T22950] 8021q: adding VLAN 0 to HW filter on device team0 [ 1709.203999][T22358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1709.213548][T22358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1709.222866][T22358] bridge0: port 1(bridge_slave_0) entered blocking state [ 1709.229939][T22358] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1709.287699][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1709.297360][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1709.306780][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1709.315967][ T2851] bridge0: port 2(bridge_slave_1) entered blocking state [ 1709.323088][ T2851] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1709.497986][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1709.517690][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1709.598447][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1709.608735][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1709.617877][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1709.627924][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1709.700688][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1709.709605][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1709.718624][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1709.733046][T22950] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1709.745813][T22950] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1709.820381][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1709.830258][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1709.910572][T22950] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1710.146106][T22961] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1710.156521][T22961] CPU: 0 PID: 22961 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 1710.164420][T22961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1710.174480][T22961] Call Trace: [ 1710.177782][T22961] dump_stack+0x172/0x1f0 [ 1710.182119][T22961] dump_header+0x10b/0x82d [ 1710.186560][T22961] oom_kill_process.cold+0x10/0x15 [ 1710.191676][T22961] out_of_memory+0x334/0x1340 [ 1710.196355][T22961] ? __sched_text_start+0x8/0x8 [ 1710.201306][T22961] ? oom_killer_disable+0x280/0x280 [ 1710.206500][T22961] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1710.212125][T22961] ? memcg_stat_show+0xc40/0xc40 [ 1710.217082][T22961] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1710.222869][T22961] ? cgroup_file_notify+0x140/0x1b0 [ 1710.228118][T22961] memory_max_write+0x262/0x3a0 [ 1710.233097][T22961] ? mem_cgroup_write+0x370/0x370 [ 1710.238241][T22961] ? lock_acquire+0x190/0x410 [ 1710.242916][T22961] ? kernfs_fop_write+0x227/0x480 [ 1710.247946][T22961] cgroup_file_write+0x241/0x790 [ 1710.252952][T22961] ? mem_cgroup_write+0x370/0x370 [ 1710.257974][T22961] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1710.263618][T22961] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1710.269236][T22961] kernfs_fop_write+0x2b8/0x480 [ 1710.274072][T22961] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1710.280292][T22961] __vfs_write+0x8a/0x110 [ 1710.284601][T22961] ? kernfs_fop_open+0xd80/0xd80 [ 1710.289516][T22961] vfs_write+0x268/0x5d0 [ 1710.293747][T22961] ksys_write+0x14f/0x290 [ 1710.298056][T22961] ? __ia32_sys_read+0xb0/0xb0 [ 1710.303889][T22961] ? do_syscall_64+0x26/0x760 [ 1710.308547][T22961] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1710.314595][T22961] ? do_syscall_64+0x26/0x760 [ 1710.319254][T22961] __x64_sys_write+0x73/0xb0 [ 1710.323824][T22961] do_syscall_64+0xfa/0x760 [ 1710.328311][T22961] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1710.334181][T22961] RIP: 0033:0x459a59 [ 1710.338072][T22961] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1710.357940][T22961] RSP: 002b:00007fa00387fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1710.366331][T22961] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 1710.374294][T22961] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1710.382246][T22961] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1710.390193][T22961] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa0038806d4 [ 1710.398145][T22961] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 1710.411046][T22961] memory: usage 3368kB, limit 0kB, failcnt 757 [ 1710.417295][T22961] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1710.417301][T22961] Memory cgroup stats for /syz5: [ 1710.417418][T22961] anon 2162688 [ 1710.417418][T22961] file 12288 [ 1710.417418][T22961] kernel_stack 65536 [ 1710.417418][T22961] slab 802816 [ 1710.417418][T22961] sock 0 [ 1710.417418][T22961] shmem 0 [ 1710.417418][T22961] file_mapped 0 [ 1710.417418][T22961] file_dirty 0 [ 1710.417418][T22961] file_writeback 0 [ 1710.417418][T22961] anon_thp 2097152 [ 1710.417418][T22961] inactive_anon 0 [ 1710.417418][T22961] active_anon 2162688 [ 1710.417418][T22961] inactive_file 0 [ 1710.417418][T22961] active_file 0 [ 1710.417418][T22961] unevictable 0 [ 1710.417418][T22961] slab_reclaimable 135168 [ 1710.417418][T22961] slab_unreclaimable 667648 [ 1710.417418][T22961] pgfault 28281 [ 1710.417418][T22961] pgmajfault 0 [ 1710.417418][T22961] workingset_refault 0 [ 1710.417418][T22961] workingset_activate 0 [ 1710.417418][T22961] workingset_nodereclaim 0 [ 1710.417418][T22961] pgrefill 33 [ 1710.417418][T22961] pgscan 33 [ 1710.417418][T22961] pgsteal 0 [ 1710.417418][T22961] pgactivate 0 [ 1710.417436][T22961] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=22959,uid=0 [ 1710.417558][T22961] Memory cgroup out of memory: Killed process 22959 (syz-executor.5) total-vm:72712kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 1710.473637][ T1072] oom_reaper: reaped process 22959 (syz-executor.5), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB 00:15:06 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)}, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r6, 0x0, 0x0) 00:15:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xfffff000, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) 00:15:06 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r5, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r5, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r4, 0x0, 0x0) 00:15:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e6000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:15:06 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1710.747312][T22950] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 00:15:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0e00002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1710.792594][T22950] CPU: 0 PID: 22950 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 1710.800626][T22950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1710.810862][T22950] Call Trace: [ 1710.814162][T22950] dump_stack+0x172/0x1f0 [ 1710.818507][T22950] dump_header+0x10b/0x82d [ 1710.822941][T22950] ? oom_kill_process+0x94/0x3f0 [ 1710.827892][T22950] oom_kill_process.cold+0x10/0x15 [ 1710.833023][T22950] out_of_memory+0x334/0x1340 [ 1710.837715][T22950] ? lock_downgrade+0x920/0x920 [ 1710.842580][T22950] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 1710.848420][T22950] ? oom_killer_disable+0x280/0x280 [ 1710.853634][T22950] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1710.859193][T22950] ? memcg_stat_show+0xc40/0xc40 [ 1710.864152][T22950] ? do_raw_spin_unlock+0x57/0x270 [ 1710.869300][T22950] ? _raw_spin_unlock+0x2d/0x50 [ 1710.874195][T22950] try_charge+0xf4b/0x1440 [ 1710.878637][T22950] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1710.884215][T22950] ? percpu_ref_tryget_live+0x111/0x290 [ 1710.889784][T22950] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1710.896046][T22950] ? __kasan_check_read+0x11/0x20 [ 1710.901097][T22950] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1710.906669][T22950] mem_cgroup_try_charge+0x136/0x590 [ 1710.911989][T22950] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1710.917646][T22950] wp_page_copy+0x407/0x1860 [ 1710.922260][T22950] ? find_held_lock+0x35/0x130 [ 1710.927038][T22950] ? do_wp_page+0x53b/0x15c0 [ 1710.931658][T22950] ? pmd_devmap_trans_unstable+0x220/0x220 [ 1710.937487][T22950] ? lock_downgrade+0x920/0x920 [ 1710.942361][T22950] ? swp_swapcount+0x540/0x540 [ 1710.947150][T22950] ? __kasan_check_read+0x11/0x20 [ 1710.954460][T22950] ? do_raw_spin_unlock+0x57/0x270 [ 1710.959595][T22950] do_wp_page+0x543/0x15c0 [ 1710.964030][T22950] ? finish_mkwrite_fault+0x6a0/0x6a0 [ 1710.969421][T22950] __handle_mm_fault+0x23ec/0x4040 [ 1710.974551][T22950] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1710.980298][T22950] ? handle_mm_fault+0x292/0xaa0 [ 1710.985737][T22950] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1710.992000][T22950] ? __kasan_check_read+0x11/0x20 [ 1710.997051][T22950] handle_mm_fault+0x3b7/0xaa0 [ 1711.001839][T22950] __do_page_fault+0x536/0xdd0 [ 1711.006634][T22950] do_page_fault+0x38/0x590 [ 1711.011161][T22950] page_fault+0x39/0x40 [ 1711.015328][T22950] RIP: 0033:0x430b36 [ 1711.019280][T22950] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 44 64 00 85 c0 0f 84 00:15:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e4800002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1711.039618][T22950] RSP: 002b:00007fffdbe64590 EFLAGS: 00010206 [ 1711.045697][T22950] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1711.053677][T22950] RDX: 0000000001007930 RSI: 000000000100f970 RDI: 0000000000000003 [ 1711.061675][T22950] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000001006940 [ 1711.069658][T22950] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1711.077640][T22950] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 [ 1711.144626][T22950] memory: usage 996kB, limit 0kB, failcnt 765 [ 1711.155220][T22950] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1711.192199][T22950] Memory cgroup stats for /syz5: [ 1711.192291][T22950] anon 4096 [ 1711.192291][T22950] file 12288 [ 1711.192291][T22950] kernel_stack 0 [ 1711.192291][T22950] slab 802816 [ 1711.192291][T22950] sock 0 [ 1711.192291][T22950] shmem 0 [ 1711.192291][T22950] file_mapped 0 [ 1711.192291][T22950] file_dirty 0 [ 1711.192291][T22950] file_writeback 0 [ 1711.192291][T22950] anon_thp 0 [ 1711.192291][T22950] inactive_anon 0 [ 1711.192291][T22950] active_anon 4096 [ 1711.192291][T22950] inactive_file 0 [ 1711.192291][T22950] active_file 0 [ 1711.192291][T22950] unevictable 0 [ 1711.192291][T22950] slab_reclaimable 135168 [ 1711.192291][T22950] slab_unreclaimable 667648 [ 1711.192291][T22950] pgfault 28281 [ 1711.192291][T22950] pgmajfault 0 [ 1711.192291][T22950] workingset_refault 0 [ 1711.192291][T22950] workingset_activate 0 [ 1711.192291][T22950] workingset_nodereclaim 0 [ 1711.192291][T22950] pgrefill 33 [ 1711.192291][T22950] pgscan 33 [ 1711.192291][T22950] pgsteal 0 [ 1711.192291][T22950] pgactivate 0 [ 1711.192291][T22950] pgdeactivate 33 00:15:06 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1711.236020][T22977] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1711.344867][T22950] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=22950,uid=0 [ 1711.363254][T22950] Memory cgroup out of memory: Killed process 22950 (syz-executor.5) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 00:15:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e6800002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1711.455654][ T1072] oom_reaper: reaped process 22950 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 00:15:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e4c00002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) 00:15:06 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:15:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e6000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) 00:15:07 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)}, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r6, 0x0, 0x0) 00:15:07 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xfffff000, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1712.426175][T23013] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1712.457777][T23012] IPVS: ftp: loaded support on port[0] = 21 [ 1713.058483][T23012] chnl_net:caif_netlink_parms(): no params data found [ 1713.104597][T23012] bridge0: port 1(bridge_slave_0) entered blocking state [ 1713.111779][T23012] bridge0: port 1(bridge_slave_0) entered disabled state [ 1713.121405][T23012] device bridge_slave_0 entered promiscuous mode [ 1713.167657][T23012] bridge0: port 2(bridge_slave_1) entered blocking state [ 1713.177719][T23012] bridge0: port 2(bridge_slave_1) entered disabled state [ 1713.186899][T23012] device bridge_slave_1 entered promiscuous mode [ 1713.215336][T23012] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1713.228321][T23012] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1713.355761][T23012] team0: Port device team_slave_0 added [ 1713.364161][T23012] team0: Port device team_slave_1 added [ 1713.526050][T23012] device hsr_slave_0 entered promiscuous mode [ 1713.603162][T23012] device hsr_slave_1 entered promiscuous mode [ 1713.669300][T23012] debugfs: Directory 'hsr0' with parent '/' already present! [ 1713.979147][T23012] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1714.001932][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1714.016461][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1714.024684][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1714.038430][T23012] 8021q: adding VLAN 0 to HW filter on device team0 [ 1714.107773][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1714.117386][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1714.126327][T12286] bridge0: port 1(bridge_slave_0) entered blocking state [ 1714.133425][T12286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1714.198295][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1714.208706][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1714.218147][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1714.229514][T22093] bridge0: port 2(bridge_slave_1) entered blocking state [ 1714.236645][T22093] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1714.304838][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1714.334505][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1714.344256][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1714.353690][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1714.364164][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1714.373279][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1714.382769][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1714.391430][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1714.401128][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1714.457665][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1714.469597][T23012] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1714.548843][T23012] 8021q: adding VLAN 0 to HW filter on device batadv0 00:15:10 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r5, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r5, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r4, 0x0, 0x0) 00:15:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e6c00002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:15:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e6800002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) 00:15:10 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{0x0}], 0x1}, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r6, 0x0, 0x0) 00:15:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xfffff000, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:15:10 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:15:10 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1715.070741][T23031] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 00:15:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e7400002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:15:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e6c00002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) 00:15:10 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r5, 0x0, 0x0) 00:15:10 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:15:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xfffff000, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:15:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e7a00002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1715.549683][T23056] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1715.603778][T23056] CPU: 0 PID: 23056 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 1715.611716][T23056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1715.621784][T23056] Call Trace: [ 1715.625098][T23056] dump_stack+0x172/0x1f0 [ 1715.629449][T23056] dump_header+0x10b/0x82d [ 1715.633977][T23056] oom_kill_process.cold+0x10/0x15 [ 1715.639140][T23056] out_of_memory+0x334/0x1340 [ 1715.644969][T23056] ? __sched_text_start+0x8/0x8 [ 1715.649829][T23056] ? oom_killer_disable+0x280/0x280 [ 1715.655057][T23056] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1715.660601][T23056] ? memcg_stat_show+0xc40/0xc40 [ 1715.666165][T23056] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1715.671990][T23056] ? cgroup_file_notify+0x140/0x1b0 [ 1715.677212][T23056] memory_max_write+0x262/0x3a0 [ 1715.682079][T23056] ? mem_cgroup_write+0x370/0x370 [ 1715.687114][T23056] ? cgroup_file_write+0x86/0x790 [ 1715.692147][T23056] cgroup_file_write+0x241/0x790 [ 1715.697092][T23056] ? mem_cgroup_write+0x370/0x370 00:15:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e7400002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1715.702119][T23056] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1715.707854][T23056] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1715.713497][T23056] kernfs_fop_write+0x2b8/0x480 [ 1715.718357][T23056] __vfs_write+0x8a/0x110 [ 1715.722710][T23056] ? kernfs_fop_open+0xd80/0xd80 [ 1715.727653][T23056] vfs_write+0x268/0x5d0 [ 1715.731899][T23056] ksys_write+0x14f/0x290 [ 1715.736244][T23056] ? __ia32_sys_read+0xb0/0xb0 [ 1715.741025][T23056] ? do_syscall_64+0x26/0x760 [ 1715.745718][T23056] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 00:15:11 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1715.751785][T23056] ? do_syscall_64+0x26/0x760 [ 1715.756481][T23056] __x64_sys_write+0x73/0xb0 [ 1715.761090][T23056] do_syscall_64+0xfa/0x760 [ 1715.765636][T23056] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1715.771537][T23056] RIP: 0033:0x459a59 [ 1715.775447][T23056] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1715.795149][T23056] RSP: 002b:00007fe041741c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1715.803585][T23056] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 1715.803594][T23056] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1715.803602][T23056] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1715.803609][T23056] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe0417426d4 [ 1715.803616][T23056] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 1715.875367][T23056] memory: usage 3512kB, limit 0kB, failcnt 433 [ 1715.885680][T23056] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1715.908932][T23056] Memory cgroup stats for /syz4: [ 1715.909617][T23056] anon 2166784 [ 1715.909617][T23056] file 40960 [ 1715.909617][T23056] kernel_stack 65536 [ 1715.909617][T23056] slab 970752 [ 1715.909617][T23056] sock 0 [ 1715.909617][T23056] shmem 0 [ 1715.909617][T23056] file_mapped 0 [ 1715.909617][T23056] file_dirty 0 [ 1715.909617][T23056] file_writeback 0 [ 1715.909617][T23056] anon_thp 2097152 [ 1715.909617][T23056] inactive_anon 0 [ 1715.909617][T23056] active_anon 2166784 [ 1715.909617][T23056] inactive_file 131072 [ 1715.909617][T23056] active_file 0 [ 1715.909617][T23056] unevictable 0 [ 1715.909617][T23056] slab_reclaimable 270336 [ 1715.909617][T23056] slab_unreclaimable 700416 [ 1715.909617][T23056] pgfault 37950 [ 1715.909617][T23056] pgmajfault 0 [ 1715.909617][T23056] workingset_refault 0 [ 1715.909617][T23056] workingset_activate 0 [ 1715.909617][T23056] workingset_nodereclaim 0 [ 1715.909617][T23056] pgrefill 69 [ 1715.909617][T23056] pgscan 5378 [ 1715.909617][T23056] pgsteal 5230 [ 1715.909617][T23056] pgactivate 99 [ 1716.040832][T23065] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1716.072501][T23056] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=23052,uid=0 [ 1716.109137][T23056] Memory cgroup out of memory: Killed process 23052 (syz-executor.4) total-vm:72576kB, anon-rss:2148kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 1716.225296][ T1072] oom_reaper: reaped process 23052 (syz-executor.4), now anon-rss:0kB, file-rss:33856kB, shmem-rss:0kB [ 1716.344832][T23012] syz-executor.4 invoked oom-killer: gfp_mask=0x40c50(GFP_NOFS|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 1716.372766][T23012] CPU: 0 PID: 23012 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 1716.380680][T23012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1716.380686][T23012] Call Trace: [ 1716.380706][T23012] dump_stack+0x172/0x1f0 [ 1716.380728][T23012] dump_header+0x10b/0x82d [ 1716.403222][T23012] ? oom_kill_process+0x94/0x3f0 [ 1716.408173][T23012] oom_kill_process.cold+0x10/0x15 [ 1716.413304][T23012] out_of_memory+0x334/0x1340 [ 1716.418027][T23012] ? lock_downgrade+0x920/0x920 [ 1716.422871][T23012] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 1716.422887][T23012] ? oom_killer_disable+0x280/0x280 [ 1716.422908][T23012] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1716.422924][T23012] ? memcg_stat_show+0xc40/0xc40 [ 1716.444369][T23012] ? do_raw_spin_unlock+0x57/0x270 [ 1716.450015][T23012] ? _raw_spin_unlock+0x2d/0x50 [ 1716.454883][T23012] try_charge+0xf4b/0x1440 [ 1716.459318][T23012] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1716.464971][T23012] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1716.470519][T23012] ? cache_grow_begin+0x122/0xd20 [ 1716.475553][T23012] ? find_held_lock+0x35/0x130 [ 1716.480343][T23012] ? cache_grow_begin+0x122/0xd20 [ 1716.485375][T23012] __memcg_kmem_charge_memcg+0x7c/0x130 [ 1716.490944][T23012] ? lock_downgrade+0x920/0x920 [ 1716.495797][T23012] ? memcg_kmem_put_cache+0x50/0x50 [ 1716.500993][T23012] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1716.507233][T23012] ? __kasan_check_read+0x11/0x20 [ 1716.512258][T23012] cache_grow_begin+0x629/0xd20 [ 1716.517103][T23012] ? __sanitizer_cov_trace_cmp4+0x11/0x20 [ 1716.522844][T23012] ? mempolicy_slab_node+0x139/0x390 [ 1716.528110][T23012] fallback_alloc+0x1fd/0x2d0 [ 1716.532769][T23012] ____cache_alloc_node+0x1bc/0x1d0 [ 1716.537948][T23012] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1716.544169][T23012] kmem_cache_alloc+0x1ef/0x710 [ 1716.549000][T23012] ? lock_downgrade+0x920/0x920 [ 1716.553835][T23012] ? rwlock_bug.part.0+0x90/0x90 [ 1716.558772][T23012] ? ratelimit_state_init+0xb0/0xb0 [ 1716.563988][T23012] ext4_alloc_inode+0x1f/0x640 [ 1716.568730][T23012] ? ratelimit_state_init+0xb0/0xb0 [ 1716.573917][T23012] alloc_inode+0x68/0x1e0 [ 1716.578235][T23012] iget_locked+0x1a6/0x4b0 [ 1716.582631][T23012] __ext4_iget+0x265/0x3e20 [ 1716.587115][T23012] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1716.593337][T23012] ? ext4_get_projid+0x190/0x190 [ 1716.598255][T23012] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1716.603781][T23012] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1716.609741][T23012] ? d_alloc_parallel+0xa78/0x1c30 [ 1716.614838][T23012] ext4_lookup+0x3b1/0x7a0 [ 1716.619235][T23012] ? ext4_cross_rename+0x1430/0x1430 [ 1716.624497][T23012] ? __lock_acquire+0x16f2/0x4a00 [ 1716.629498][T23012] ? __kasan_check_read+0x11/0x20 [ 1716.634528][T23012] ? lockdep_init_map+0x1be/0x6d0 [ 1716.639533][T23012] __lookup_slow+0x279/0x500 [ 1716.644101][T23012] ? vfs_unlink+0x620/0x620 [ 1716.648607][T23012] lookup_slow+0x58/0x80 [ 1716.652844][T23012] path_mountpoint+0x5d2/0x1e60 [ 1716.657690][T23012] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1716.663214][T23012] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1716.669175][T23012] ? path_openat+0x46d0/0x46d0 [ 1716.673925][T23012] filename_mountpoint+0x18e/0x390 [ 1716.679098][T23012] ? filename_parentat.isra.0+0x410/0x410 [ 1716.684808][T23012] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1716.690976][T23012] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1716.697212][T23012] ? __phys_addr_symbol+0x30/0x70 [ 1716.702230][T23012] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1716.707932][T23012] ? __check_object_size+0x3d/0x437 [ 1716.713126][T23012] ? strncpy_from_user+0x2b4/0x400 [ 1716.718307][T23012] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1716.724526][T23012] ? getname_flags+0x277/0x5b0 [ 1716.729271][T23012] user_path_mountpoint_at+0x3a/0x50 [ 1716.734546][T23012] ksys_umount+0x164/0xf00 [ 1716.739116][T23012] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1716.745338][T23012] ? __detach_mounts+0x2a0/0x2a0 [ 1716.750255][T23012] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1716.756219][T23012] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1716.761655][T23012] ? do_syscall_64+0x26/0x760 [ 1716.766311][T23012] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1716.772368][T23012] ? do_syscall_64+0x26/0x760 [ 1716.777024][T23012] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1716.782287][T23012] __x64_sys_umount+0x54/0x80 [ 1716.786944][T23012] do_syscall_64+0xfa/0x760 [ 1716.791446][T23012] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1716.797334][T23012] RIP: 0033:0x45c487 [ 1716.801220][T23012] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1716.823705][T23012] RSP: 002b:00007ffdfeab3d18 EFLAGS: 00000202 ORIG_RAX: 00000000000000a6 [ 1716.832113][T23012] RAX: ffffffffffffffda RBX: 00000000001a2cf0 RCX: 000000000045c487 [ 1716.840072][T23012] RDX: 0000000000403550 RSI: 0000000000000002 RDI: 00007ffdfeab3dc0 [ 1716.848032][T23012] RBP: 0000000000000006 R08: 0000000000000000 R09: 000000000000000e [ 1716.855982][T23012] R10: 000000000000000a R11: 0000000000000202 R12: 00007ffdfeab4e50 [ 1716.863931][T23012] R13: 00000000013d2940 R14: 0000000000000000 R15: 00007ffdfeab4e50 [ 1716.879632][T23012] memory: usage 1180kB, limit 0kB, failcnt 453 [ 1716.885984][T23012] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1716.893270][T23012] Memory cgroup stats for /syz4: [ 1716.893378][T23012] anon 53248 [ 1716.893378][T23012] file 40960 [ 1716.893378][T23012] kernel_stack 65536 [ 1716.893378][T23012] slab 970752 [ 1716.893378][T23012] sock 0 [ 1716.893378][T23012] shmem 0 [ 1716.893378][T23012] file_mapped 0 [ 1716.893378][T23012] file_dirty 0 [ 1716.893378][T23012] file_writeback 0 [ 1716.893378][T23012] anon_thp 0 [ 1716.893378][T23012] inactive_anon 0 [ 1716.893378][T23012] active_anon 53248 [ 1716.893378][T23012] inactive_file 131072 [ 1716.893378][T23012] active_file 0 [ 1716.893378][T23012] unevictable 0 [ 1716.893378][T23012] slab_reclaimable 270336 [ 1716.893378][T23012] slab_unreclaimable 700416 [ 1716.893378][T23012] pgfault 37950 [ 1716.893378][T23012] pgmajfault 0 [ 1716.893378][T23012] workingset_refault 0 [ 1716.893378][T23012] workingset_activate 0 [ 1716.893378][T23012] workingset_nodereclaim 0 [ 1716.893378][T23012] pgrefill 69 [ 1716.893378][T23012] pgscan 5378 [ 1716.893378][T23012] pgsteal 5230 [ 1716.893378][T23012] pgactivate 99 [ 1716.988852][T23012] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=23012,uid=0 [ 1717.005761][T23012] Memory cgroup out of memory: Killed process 23012 (syz-executor.4) total-vm:72444kB, anon-rss:100kB, file-rss:35776kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 [ 1717.031515][ T1072] oom_reaper: reaped process 23012 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 1717.066537][T23083] IPVS: ftp: loaded support on port[0] = 21 [ 1717.648133][T23083] chnl_net:caif_netlink_parms(): no params data found [ 1717.753879][T23083] bridge0: port 1(bridge_slave_0) entered blocking state [ 1717.761037][T23083] bridge0: port 1(bridge_slave_0) entered disabled state [ 1717.770092][T23083] device bridge_slave_0 entered promiscuous mode [ 1717.779465][T23083] bridge0: port 2(bridge_slave_1) entered blocking state [ 1717.787072][T23083] bridge0: port 2(bridge_slave_1) entered disabled state [ 1717.796099][T23083] device bridge_slave_1 entered promiscuous mode [ 1717.904679][T23083] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1717.918031][T23083] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1717.941740][T23083] team0: Port device team_slave_0 added [ 1717.980961][T23083] team0: Port device team_slave_1 added [ 1718.055497][T23083] device hsr_slave_0 entered promiscuous mode [ 1718.103017][T23083] device hsr_slave_1 entered promiscuous mode [ 1718.152070][T23083] debugfs: Directory 'hsr0' with parent '/' already present! [ 1718.216762][T23083] bridge0: port 2(bridge_slave_1) entered blocking state [ 1718.223993][T23083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1718.231382][T23083] bridge0: port 1(bridge_slave_0) entered blocking state [ 1718.238514][T23083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1718.408853][T23083] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1718.470592][T18353] bridge0: port 1(bridge_slave_0) entered disabled state [ 1718.481515][T18353] bridge0: port 2(bridge_slave_1) entered disabled state [ 1718.504722][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1718.514062][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1718.597974][T23083] 8021q: adding VLAN 0 to HW filter on device team0 [ 1718.618415][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1718.628084][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1718.637519][T18353] bridge0: port 1(bridge_slave_0) entered blocking state [ 1718.644646][T18353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1718.662674][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1718.671915][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1718.680961][T18353] bridge0: port 2(bridge_slave_1) entered blocking state [ 1718.688084][T18353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1718.697356][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1718.765568][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1718.775659][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1718.787919][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1718.964268][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1718.973669][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1718.983266][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1719.015317][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1719.024508][T18353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1719.040332][T23083] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1719.054231][T23083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1719.123057][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1719.131942][ T2851] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1719.148358][T23083] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1719.386135][T23091] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1719.397327][T23091] CPU: 0 PID: 23091 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 1719.405235][T23091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1719.415296][T23091] Call Trace: [ 1719.418617][T23091] dump_stack+0x172/0x1f0 [ 1719.422953][T23091] dump_header+0x10b/0x82d [ 1719.427371][T23091] oom_kill_process.cold+0x10/0x15 [ 1719.432487][T23091] out_of_memory+0x334/0x1340 [ 1719.437165][T23091] ? __sched_text_start+0x8/0x8 [ 1719.442016][T23091] ? oom_killer_disable+0x280/0x280 [ 1719.447221][T23091] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1719.452763][T23091] ? memcg_stat_show+0xc40/0xc40 [ 1719.457716][T23091] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1719.463539][T23091] ? cgroup_file_notify+0x140/0x1b0 [ 1719.468748][T23091] memory_max_write+0x262/0x3a0 [ 1719.473728][T23091] ? mem_cgroup_write+0x370/0x370 [ 1719.478738][T23091] ? cgroup_file_write+0x86/0x790 [ 1719.483752][T23091] cgroup_file_write+0x241/0x790 [ 1719.488769][T23091] ? mem_cgroup_write+0x370/0x370 [ 1719.493946][T23091] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1719.499591][T23091] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1719.505436][T23091] kernfs_fop_write+0x2b8/0x480 [ 1719.510281][T23091] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1719.516516][T23091] __vfs_write+0x8a/0x110 [ 1719.520841][T23091] ? kernfs_fop_open+0xd80/0xd80 [ 1719.525758][T23091] vfs_write+0x268/0x5d0 [ 1719.529982][T23091] ksys_write+0x14f/0x290 [ 1719.534301][T23091] ? __ia32_sys_read+0xb0/0xb0 [ 1719.539048][T23091] ? do_syscall_64+0x26/0x760 [ 1719.543724][T23091] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1719.549779][T23091] ? do_syscall_64+0x26/0x760 [ 1719.554450][T23091] __x64_sys_write+0x73/0xb0 [ 1719.559025][T23091] do_syscall_64+0xfa/0x760 [ 1719.563513][T23091] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1719.569382][T23091] RIP: 0033:0x459a59 [ 1719.573432][T23091] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1719.593029][T23091] RSP: 002b:00007f25a0269c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1719.601418][T23091] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 1719.609454][T23091] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1719.617494][T23091] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1719.625457][T23091] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25a026a6d4 [ 1719.633409][T23091] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 1719.669392][T23091] memory: usage 3308kB, limit 0kB, failcnt 766 [ 1719.676517][T23091] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1719.683513][T23091] Memory cgroup stats for /syz5: [ 1719.690515][T23091] anon 2113536 [ 1719.690515][T23091] file 12288 [ 1719.690515][T23091] kernel_stack 0 [ 1719.690515][T23091] slab 802816 [ 1719.690515][T23091] sock 0 [ 1719.690515][T23091] shmem 0 [ 1719.690515][T23091] file_mapped 0 [ 1719.690515][T23091] file_dirty 0 [ 1719.690515][T23091] file_writeback 0 [ 1719.690515][T23091] anon_thp 2097152 [ 1719.690515][T23091] inactive_anon 0 [ 1719.690515][T23091] active_anon 2113536 [ 1719.690515][T23091] inactive_file 0 [ 1719.690515][T23091] active_file 0 [ 1719.690515][T23091] unevictable 0 [ 1719.690515][T23091] slab_reclaimable 135168 [ 1719.690515][T23091] slab_unreclaimable 667648 [ 1719.690515][T23091] pgfault 28347 [ 1719.690515][T23091] pgmajfault 0 [ 1719.690515][T23091] workingset_refault 0 [ 1719.690515][T23091] workingset_activate 0 [ 1719.690515][T23091] workingset_nodereclaim 0 [ 1719.690515][T23091] pgrefill 33 [ 1719.690515][T23091] pgscan 33 [ 1719.690515][T23091] pgsteal 0 [ 1719.690515][T23091] pgactivate 0 [ 1719.863101][T23091] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=23090,uid=0 [ 1719.879807][T23091] Memory cgroup out of memory: Killed process 23090 (syz-executor.5) total-vm:72580kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 1719.904341][ T1072] oom_reaper: reaped process 23090 (syz-executor.5), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB 00:15:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2ef000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:15:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{0x0}], 0x1}, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r6, 0x0, 0x0) 00:15:15 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:15:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e7a00002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) 00:15:15 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r5, 0x0, 0x0) 00:15:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xfffff000, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1720.141242][T23083] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1720.164865][T23083] CPU: 1 PID: 23083 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 1720.172783][T23083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1720.182840][T23083] Call Trace: [ 1720.186140][T23083] dump_stack+0x172/0x1f0 [ 1720.190483][T23083] dump_header+0x10b/0x82d [ 1720.194908][T23083] ? oom_kill_process+0x94/0x3f0 [ 1720.199859][T23083] oom_kill_process.cold+0x10/0x15 [ 1720.205509][T23083] out_of_memory+0x334/0x1340 [ 1720.210194][T23083] ? lock_downgrade+0x920/0x920 [ 1720.215058][T23083] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 1720.220871][T23083] ? oom_killer_disable+0x280/0x280 [ 1720.226090][T23083] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1720.231641][T23083] ? memcg_stat_show+0xc40/0xc40 [ 1720.236675][T23083] ? do_raw_spin_unlock+0x57/0x270 [ 1720.241793][T23083] ? _raw_spin_unlock+0x2d/0x50 [ 1720.246652][T23083] try_charge+0xf4b/0x1440 [ 1720.251089][T23083] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1720.256646][T23083] ? percpu_ref_tryget_live+0x111/0x290 [ 1720.262203][T23083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1720.268472][T23083] ? __kasan_check_read+0x11/0x20 [ 1720.273516][T23083] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1720.279076][T23083] mem_cgroup_try_charge+0x136/0x590 [ 1720.284374][T23083] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1720.290018][T23083] wp_page_copy+0x407/0x1860 [ 1720.294616][T23083] ? find_held_lock+0x35/0x130 [ 1720.299394][T23083] ? do_wp_page+0x53b/0x15c0 [ 1720.303996][T23083] ? pmd_devmap_trans_unstable+0x220/0x220 [ 1720.309816][T23083] ? lock_downgrade+0x920/0x920 [ 1720.314677][T23083] ? swp_swapcount+0x540/0x540 [ 1720.319450][T23083] ? __kasan_check_read+0x11/0x20 [ 1720.324483][T23083] ? do_raw_spin_unlock+0x57/0x270 [ 1720.329605][T23083] do_wp_page+0x543/0x15c0 [ 1720.334042][T23083] ? finish_mkwrite_fault+0x6a0/0x6a0 [ 1720.339430][T23083] __handle_mm_fault+0x23ec/0x4040 [ 1720.344561][T23083] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1720.350213][T23083] ? handle_mm_fault+0x292/0xaa0 [ 1720.355297][T23083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1720.361551][T23083] ? __kasan_check_read+0x11/0x20 [ 1720.366645][T23083] handle_mm_fault+0x3b7/0xaa0 [ 1720.371566][T23083] __do_page_fault+0x536/0xdd0 [ 1720.376349][T23083] do_page_fault+0x38/0x590 [ 1720.380862][T23083] page_fault+0x39/0x40 [ 1720.385022][T23083] RIP: 0033:0x430b36 [ 1720.388919][T23083] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 44 64 00 85 c0 0f 84 [ 1720.408538][T23083] RSP: 002b:00007ffe4120f780 EFLAGS: 00010206 [ 1720.414785][T23083] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1720.422766][T23083] RDX: 0000000001151930 RSI: 0000000001159970 RDI: 0000000000000003 [ 1720.430749][T23083] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000001150940 [ 1720.438734][T23083] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1720.446739][T23083] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 [ 1720.502082][T23083] memory: usage 980kB, limit 0kB, failcnt 774 [ 1720.509407][T23083] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1720.527242][T23100] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1720.535949][T23083] Memory cgroup stats for /syz5: [ 1720.536058][T23083] anon 8192 [ 1720.536058][T23083] file 12288 [ 1720.536058][T23083] kernel_stack 0 [ 1720.536058][T23083] slab 802816 [ 1720.536058][T23083] sock 0 [ 1720.536058][T23083] shmem 0 [ 1720.536058][T23083] file_mapped 0 [ 1720.536058][T23083] file_dirty 0 [ 1720.536058][T23083] file_writeback 0 [ 1720.536058][T23083] anon_thp 0 [ 1720.536058][T23083] inactive_anon 0 [ 1720.536058][T23083] active_anon 8192 [ 1720.536058][T23083] inactive_file 0 [ 1720.536058][T23083] active_file 0 [ 1720.536058][T23083] unevictable 0 [ 1720.536058][T23083] slab_reclaimable 135168 [ 1720.536058][T23083] slab_unreclaimable 667648 [ 1720.536058][T23083] pgfault 28347 00:15:15 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1720.536058][T23083] pgmajfault 0 [ 1720.536058][T23083] workingset_refault 0 [ 1720.536058][T23083] workingset_activate 0 [ 1720.536058][T23083] workingset_nodereclaim 0 [ 1720.536058][T23083] pgrefill 33 [ 1720.536058][T23083] pgscan 33 [ 1720.536058][T23083] pgsteal 0 [ 1720.536058][T23083] pgactivate 0 [ 1720.536058][T23083] pgdeactivate 33 00:15:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2ef000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1720.746130][T23083] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=23083,uid=0 [ 1720.763237][T23083] Memory cgroup out of memory: Killed process 23083 (syz-executor.5) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 [ 1720.788287][ T1072] oom_reaper: reaped process 23083 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 00:15:16 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:15:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0003002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:15:16 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:15:16 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xfffff000, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1721.108776][T23130] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 00:15:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0003002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) 00:15:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{0x0}], 0x1}, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r6, 0x0, 0x0) 00:15:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0005002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:15:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0005002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1721.863382][T23141] IPVS: ftp: loaded support on port[0] = 21 [ 1722.300268][T23141] chnl_net:caif_netlink_parms(): no params data found [ 1722.408403][T23141] bridge0: port 1(bridge_slave_0) entered blocking state [ 1722.416317][T23141] bridge0: port 1(bridge_slave_0) entered disabled state [ 1722.425278][T23141] device bridge_slave_0 entered promiscuous mode [ 1722.434506][T23141] bridge0: port 2(bridge_slave_1) entered blocking state [ 1722.441640][T23141] bridge0: port 2(bridge_slave_1) entered disabled state [ 1722.450740][T23141] device bridge_slave_1 entered promiscuous mode [ 1722.559898][T23141] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1722.573259][T23141] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1722.676813][T23141] team0: Port device team_slave_0 added [ 1722.685166][T23141] team0: Port device team_slave_1 added [ 1722.775684][T23141] device hsr_slave_0 entered promiscuous mode [ 1722.832879][T23141] device hsr_slave_1 entered promiscuous mode [ 1722.872136][T23141] debugfs: Directory 'hsr0' with parent '/' already present! [ 1723.033095][T23141] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1723.160095][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1723.168853][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1723.181669][T23141] 8021q: adding VLAN 0 to HW filter on device team0 [ 1723.195170][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1723.204762][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1723.214139][T22093] bridge0: port 1(bridge_slave_0) entered blocking state [ 1723.221216][T22093] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1723.229989][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1723.304585][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1723.317770][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1723.326465][T20483] bridge0: port 2(bridge_slave_1) entered blocking state [ 1723.333567][T20483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1723.341589][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1723.372520][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1723.381555][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1723.403208][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1723.412349][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1723.421490][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1723.495669][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1723.504636][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1723.524290][T22357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1723.534670][T23141] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1723.613230][T23141] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1723.863705][T23160] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1723.874818][T23160] CPU: 0 PID: 23160 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 1723.882727][T23160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1723.892790][T23160] Call Trace: [ 1723.896086][T23160] dump_stack+0x172/0x1f0 [ 1723.900466][T23160] dump_header+0x10b/0x82d [ 1723.904891][T23160] oom_kill_process.cold+0x10/0x15 [ 1723.910027][T23160] out_of_memory+0x334/0x1340 [ 1723.914730][T23160] ? __sched_text_start+0x8/0x8 [ 1723.919582][T23160] ? oom_killer_disable+0x280/0x280 [ 1723.924813][T23160] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1723.930358][T23160] ? memcg_stat_show+0xc40/0xc40 [ 1723.935496][T23160] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1723.941412][T23160] ? cgroup_file_notify+0x140/0x1b0 [ 1723.946610][T23160] memory_max_write+0x262/0x3a0 [ 1723.951504][T23160] ? mem_cgroup_write+0x370/0x370 [ 1723.956516][T23160] ? lock_acquire+0x20b/0x410 [ 1723.961196][T23160] cgroup_file_write+0x241/0x790 [ 1723.966118][T23160] ? mem_cgroup_write+0x370/0x370 [ 1723.971158][T23160] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1723.976805][T23160] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1723.982439][T23160] kernfs_fop_write+0x2b8/0x480 [ 1723.987367][T23160] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1723.993602][T23160] __vfs_write+0x8a/0x110 [ 1723.997920][T23160] ? kernfs_fop_open+0xd80/0xd80 [ 1724.002847][T23160] vfs_write+0x268/0x5d0 [ 1724.007074][T23160] ksys_write+0x14f/0x290 [ 1724.011386][T23160] ? __ia32_sys_read+0xb0/0xb0 [ 1724.016246][T23160] ? do_syscall_64+0x26/0x760 [ 1724.020915][T23160] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1724.026970][T23160] ? do_syscall_64+0x26/0x760 [ 1724.031639][T23160] __x64_sys_write+0x73/0xb0 [ 1724.036223][T23160] do_syscall_64+0xfa/0x760 [ 1724.040719][T23160] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1724.046590][T23160] RIP: 0033:0x459a59 [ 1724.050465][T23160] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1724.070057][T23160] RSP: 002b:00007fc076888c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1724.078457][T23160] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 1724.086416][T23160] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1724.094368][T23160] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1724.102319][T23160] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc0768896d4 [ 1724.110269][T23160] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 1724.137332][T23160] memory: usage 3536kB, limit 0kB, failcnt 454 [ 1724.144066][T23160] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1724.153453][T23160] Memory cgroup stats for /syz4: [ 1724.154659][T23160] anon 2129920 [ 1724.154659][T23160] file 40960 [ 1724.154659][T23160] kernel_stack 65536 [ 1724.154659][T23160] slab 1105920 [ 1724.154659][T23160] sock 0 [ 1724.154659][T23160] shmem 0 [ 1724.154659][T23160] file_mapped 0 [ 1724.154659][T23160] file_dirty 0 [ 1724.154659][T23160] file_writeback 0 [ 1724.154659][T23160] anon_thp 2097152 [ 1724.154659][T23160] inactive_anon 0 [ 1724.154659][T23160] active_anon 2129920 [ 1724.154659][T23160] inactive_file 131072 [ 1724.154659][T23160] active_file 0 [ 1724.154659][T23160] unevictable 0 [ 1724.154659][T23160] slab_reclaimable 270336 [ 1724.154659][T23160] slab_unreclaimable 835584 [ 1724.154659][T23160] pgfault 38016 [ 1724.154659][T23160] pgmajfault 0 [ 1724.154659][T23160] workingset_refault 0 [ 1724.154659][T23160] workingset_activate 0 [ 1724.154659][T23160] workingset_nodereclaim 0 [ 1724.154659][T23160] pgrefill 69 [ 1724.154659][T23160] pgscan 5378 [ 1724.154659][T23160] pgsteal 5230 [ 1724.154659][T23160] pgactivate 99 [ 1724.271285][T23160] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=23159,uid=0 [ 1724.291158][T23160] Memory cgroup out of memory: Killed process 23159 (syz-executor.4) total-vm:72580kB, anon-rss:2136kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 [ 1724.313682][ T1072] oom_reaper: reaped process 23159 (syz-executor.4), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB 00:15:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r5, 0x0, 0x0) 00:15:19 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:15:19 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xfffff000, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) 00:15:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)}], 0x1}, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r6, 0x0, 0x0) 00:15:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0006002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:15:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0006002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1724.626199][T23141] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1724.658460][T23141] CPU: 1 PID: 23141 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 1724.666414][T23141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1724.676477][T23141] Call Trace: [ 1724.679874][T23141] dump_stack+0x172/0x1f0 [ 1724.684220][T23141] dump_header+0x10b/0x82d [ 1724.689690][T23141] ? oom_kill_process+0x94/0x3f0 [ 1724.694643][T23141] oom_kill_process.cold+0x10/0x15 [ 1724.699766][T23141] out_of_memory+0x334/0x1340 [ 1724.704460][T23141] ? lock_downgrade+0x920/0x920 [ 1724.709319][T23141] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 1724.715131][T23141] ? oom_killer_disable+0x280/0x280 [ 1724.720344][T23141] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1724.725892][T23141] ? memcg_stat_show+0xc40/0xc40 [ 1724.730841][T23141] ? do_raw_spin_unlock+0x57/0x270 [ 1724.735960][T23141] ? _raw_spin_unlock+0x2d/0x50 [ 1724.741789][T23141] try_charge+0xf4b/0x1440 [ 1724.746231][T23141] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1724.751777][T23141] ? percpu_ref_tryget_live+0x111/0x290 [ 1724.757333][T23141] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1724.763583][T23141] ? __kasan_check_read+0x11/0x20 [ 1724.768625][T23141] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1724.774186][T23141] mem_cgroup_try_charge+0x136/0x590 [ 1724.779579][T23141] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1724.785256][T23141] wp_page_copy+0x407/0x1860 [ 1724.789855][T23141] ? find_held_lock+0x35/0x130 [ 1724.794625][T23141] ? do_wp_page+0x53b/0x15c0 [ 1724.799227][T23141] ? pmd_devmap_trans_unstable+0x220/0x220 [ 1724.805040][T23141] ? lock_downgrade+0x920/0x920 [ 1724.810055][T23141] ? swp_swapcount+0x540/0x540 [ 1724.814829][T23141] ? __kasan_check_read+0x11/0x20 [ 1724.819858][T23141] ? do_raw_spin_unlock+0x57/0x270 [ 1724.824979][T23141] do_wp_page+0x543/0x15c0 [ 1724.829530][T23141] ? finish_mkwrite_fault+0x6a0/0x6a0 [ 1724.834921][T23141] __handle_mm_fault+0x23ec/0x4040 [ 1724.840054][T23141] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1724.845612][T23141] ? handle_mm_fault+0x292/0xaa0 [ 1724.851526][T23141] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1724.857779][T23141] ? __kasan_check_read+0x11/0x20 [ 1724.862821][T23141] handle_mm_fault+0x3b7/0xaa0 [ 1724.867609][T23141] __do_page_fault+0x536/0xdd0 [ 1724.872502][T23141] do_page_fault+0x38/0x590 [ 1724.877040][T23141] page_fault+0x39/0x40 [ 1724.881192][T23141] RIP: 0033:0x430b36 [ 1724.885087][T23141] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 44 64 00 85 c0 0f 84 [ 1724.904694][T23141] RSP: 002b:00007ffe04a53710 EFLAGS: 00010206 [ 1724.910767][T23141] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1724.918741][T23141] RDX: 0000000000db2930 RSI: 0000000000dba970 RDI: 0000000000000003 [ 1724.926721][T23141] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000000db1940 [ 1724.934695][T23141] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1724.942690][T23141] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 00:15:20 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1724.986747][T23171] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1725.041285][T23141] memory: usage 1208kB, limit 0kB, failcnt 462 [ 1725.082193][T23141] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1725.103780][T23141] Memory cgroup stats for /syz4: [ 1725.103891][T23141] anon 65536 [ 1725.103891][T23141] file 40960 [ 1725.103891][T23141] kernel_stack 0 [ 1725.103891][T23141] slab 1105920 [ 1725.103891][T23141] sock 0 [ 1725.103891][T23141] shmem 0 [ 1725.103891][T23141] file_mapped 0 [ 1725.103891][T23141] file_dirty 0 [ 1725.103891][T23141] file_writeback 0 [ 1725.103891][T23141] anon_thp 0 [ 1725.103891][T23141] inactive_anon 0 [ 1725.103891][T23141] active_anon 65536 [ 1725.103891][T23141] inactive_file 131072 [ 1725.103891][T23141] active_file 0 [ 1725.103891][T23141] unevictable 0 [ 1725.103891][T23141] slab_reclaimable 270336 [ 1725.103891][T23141] slab_unreclaimable 835584 [ 1725.103891][T23141] pgfault 38016 [ 1725.103891][T23141] pgmajfault 0 [ 1725.103891][T23141] workingset_refault 0 [ 1725.103891][T23141] workingset_activate 0 [ 1725.103891][T23141] workingset_nodereclaim 0 [ 1725.103891][T23141] pgrefill 69 [ 1725.103891][T23141] pgscan 5378 [ 1725.103891][T23141] pgsteal 5230 [ 1725.103891][T23141] pgactivate 99 [ 1725.272384][T23141] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=23141,uid=0 [ 1725.320205][T23141] Memory cgroup out of memory: Killed process 23141 (syz-executor.4) total-vm:72448kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 00:15:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0007002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) 00:15:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0007002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:15:20 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:15:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xfffff000, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1725.807957][T23196] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 00:15:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e000a002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:15:21 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r5, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r5, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r4, 0x0, 0x0) 00:15:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e000a002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) 00:15:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e000e002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1726.330184][T23208] IPVS: ftp: loaded support on port[0] = 21 [ 1726.876552][T23208] chnl_net:caif_netlink_parms(): no params data found [ 1726.920132][T23208] bridge0: port 1(bridge_slave_0) entered blocking state [ 1726.928691][T23208] bridge0: port 1(bridge_slave_0) entered disabled state [ 1726.937595][T23208] device bridge_slave_0 entered promiscuous mode [ 1727.027618][T23208] bridge0: port 2(bridge_slave_1) entered blocking state [ 1727.036926][T23208] bridge0: port 2(bridge_slave_1) entered disabled state [ 1727.045807][T23208] device bridge_slave_1 entered promiscuous mode [ 1727.161567][T23208] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1727.175356][T23208] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1727.249637][T23208] team0: Port device team_slave_0 added [ 1727.259750][T23208] team0: Port device team_slave_1 added [ 1727.335654][T23208] device hsr_slave_0 entered promiscuous mode [ 1727.402970][T23208] device hsr_slave_1 entered promiscuous mode [ 1727.452170][T23208] debugfs: Directory 'hsr0' with parent '/' already present! [ 1727.660261][T23208] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1727.682968][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1727.691685][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1727.705388][T23208] 8021q: adding VLAN 0 to HW filter on device team0 [ 1727.720127][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1727.731202][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1727.740189][T22093] bridge0: port 1(bridge_slave_0) entered blocking state [ 1727.747309][T22093] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1727.833249][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1727.841571][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1727.851476][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1727.860295][T20483] bridge0: port 2(bridge_slave_1) entered blocking state [ 1727.867387][T20483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1727.877857][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1727.962758][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1727.974100][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1727.997038][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1728.006420][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1728.016333][T20483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1728.107293][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1728.118804][T23208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1728.209701][T23208] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1728.426495][T23233] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1728.437228][T23233] CPU: 1 PID: 23233 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 1728.445150][T23233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1728.455300][T23233] Call Trace: [ 1728.458600][T23233] dump_stack+0x172/0x1f0 [ 1728.462943][T23233] dump_header+0x10b/0x82d [ 1728.467731][T23233] oom_kill_process.cold+0x10/0x15 [ 1728.472852][T23233] out_of_memory+0x334/0x1340 [ 1728.477529][T23233] ? __sched_text_start+0x8/0x8 [ 1728.482381][T23233] ? oom_killer_disable+0x280/0x280 [ 1728.487582][T23233] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1728.493122][T23233] ? memcg_stat_show+0xc40/0xc40 [ 1728.498056][T23233] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1728.503844][T23233] ? cgroup_file_notify+0x140/0x1b0 [ 1728.509021][T23233] memory_max_write+0x262/0x3a0 [ 1728.513871][T23233] ? mem_cgroup_write+0x370/0x370 [ 1728.518888][T23233] ? lock_acquire+0x190/0x410 [ 1728.523547][T23233] ? kernfs_fop_write+0x227/0x480 [ 1728.528575][T23233] cgroup_file_write+0x241/0x790 [ 1728.533512][T23233] ? mem_cgroup_write+0x370/0x370 [ 1728.538550][T23233] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1728.544175][T23233] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1728.549818][T23233] kernfs_fop_write+0x2b8/0x480 [ 1728.554648][T23233] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1728.560898][T23233] __vfs_write+0x8a/0x110 [ 1728.565206][T23233] ? kernfs_fop_open+0xd80/0xd80 [ 1728.570126][T23233] vfs_write+0x268/0x5d0 [ 1728.574346][T23233] ksys_write+0x14f/0x290 [ 1728.578653][T23233] ? __ia32_sys_read+0xb0/0xb0 [ 1728.583421][T23233] ? do_syscall_64+0x26/0x760 [ 1728.588109][T23233] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1728.594173][T23233] ? do_syscall_64+0x26/0x760 [ 1728.598835][T23233] __x64_sys_write+0x73/0xb0 [ 1728.603407][T23233] do_syscall_64+0xfa/0x760 [ 1728.607932][T23233] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1728.613812][T23233] RIP: 0033:0x459a59 [ 1728.617704][T23233] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1728.637292][T23233] RSP: 002b:00007ffb343e9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1728.645771][T23233] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 1728.653722][T23233] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1728.662289][T23233] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1728.670245][T23233] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb343ea6d4 [ 1728.678204][T23233] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 1728.693297][T23233] memory: usage 3404kB, limit 0kB, failcnt 775 [ 1728.699484][T23233] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1728.712817][T23233] Memory cgroup stats for /syz5: [ 1728.712949][T23233] anon 2117632 [ 1728.712949][T23233] file 12288 [ 1728.712949][T23233] kernel_stack 65536 [ 1728.712949][T23233] slab 802816 [ 1728.712949][T23233] sock 0 [ 1728.712949][T23233] shmem 0 [ 1728.712949][T23233] file_mapped 0 [ 1728.712949][T23233] file_dirty 0 [ 1728.712949][T23233] file_writeback 0 [ 1728.712949][T23233] anon_thp 2097152 [ 1728.712949][T23233] inactive_anon 0 [ 1728.712949][T23233] active_anon 2117632 [ 1728.712949][T23233] inactive_file 0 [ 1728.712949][T23233] active_file 0 [ 1728.712949][T23233] unevictable 0 [ 1728.712949][T23233] slab_reclaimable 135168 [ 1728.712949][T23233] slab_unreclaimable 667648 [ 1728.712949][T23233] pgfault 28380 [ 1728.712949][T23233] pgmajfault 0 [ 1728.712949][T23233] workingset_refault 0 [ 1728.712949][T23233] workingset_activate 0 [ 1728.712949][T23233] workingset_nodereclaim 0 [ 1728.712949][T23233] pgrefill 33 [ 1728.712949][T23233] pgscan 33 [ 1728.712949][T23233] pgsteal 0 [ 1728.712949][T23233] pgactivate 0 [ 1728.810194][T23233] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=23231,uid=0 [ 1728.827857][T23233] Memory cgroup out of memory: Killed process 23231 (syz-executor.5) total-vm:72712kB, anon-rss:2136kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 1728.847774][ T1072] oom_reaper: reaped process 23231 (syz-executor.5), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB 00:15:24 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)}], 0x1}, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r6, 0x0, 0x0) 00:15:24 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:15:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r5, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r5, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r4, 0x0, 0x0) 00:15:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xfffff000, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) 00:15:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e000d002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) 00:15:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e000f002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1728.980778][T23208] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1729.026609][T23208] CPU: 1 PID: 23208 Comm: syz-executor.5 Not tainted 5.4.0-rc1+ #0 [ 1729.034562][T23208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1729.044655][T23208] Call Trace: [ 1729.047961][T23208] dump_stack+0x172/0x1f0 [ 1729.052310][T23208] dump_header+0x10b/0x82d [ 1729.056736][T23208] ? oom_kill_process+0x94/0x3f0 [ 1729.061707][T23208] oom_kill_process.cold+0x10/0x15 [ 1729.066855][T23208] out_of_memory+0x334/0x1340 [ 1729.071541][T23208] ? lock_downgrade+0x920/0x920 [ 1729.076403][T23208] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 1729.082239][T23208] ? oom_killer_disable+0x280/0x280 [ 1729.087459][T23208] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1729.093013][T23208] ? memcg_stat_show+0xc40/0xc40 [ 1729.097962][T23208] ? do_raw_spin_unlock+0x57/0x270 [ 1729.103082][T23208] ? _raw_spin_unlock+0x2d/0x50 [ 1729.107941][T23208] try_charge+0xf4b/0x1440 [ 1729.110810][T23247] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1729.112369][T23208] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1729.112384][T23208] ? percpu_ref_tryget_live+0x111/0x290 [ 1729.112401][T23208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1729.112419][T23208] ? __kasan_check_read+0x11/0x20 [ 1729.112439][T23208] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1729.112460][T23208] mem_cgroup_try_charge+0x136/0x590 [ 1729.112482][T23208] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1729.112501][T23208] wp_page_copy+0x407/0x1860 [ 1729.139066][T23208] ? find_held_lock+0x35/0x130 [ 1729.139085][T23208] ? do_wp_page+0x53b/0x15c0 [ 1729.139105][T23208] ? pmd_devmap_trans_unstable+0x220/0x220 [ 1729.139121][T23208] ? lock_downgrade+0x920/0x920 [ 1729.139141][T23208] ? swp_swapcount+0x540/0x540 [ 1729.139165][T23208] ? __kasan_check_read+0x11/0x20 [ 1729.194890][T23208] ? do_raw_spin_unlock+0x57/0x270 [ 1729.200037][T23208] do_wp_page+0x543/0x15c0 [ 1729.200061][T23208] ? finish_mkwrite_fault+0x6a0/0x6a0 [ 1729.200086][T23208] __handle_mm_fault+0x23ec/0x4040 [ 1729.200107][T23208] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1729.200124][T23208] ? handle_mm_fault+0x292/0xaa0 [ 1729.200152][T23208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1729.200172][T23208] ? __kasan_check_read+0x11/0x20 [ 1729.237119][T23208] handle_mm_fault+0x3b7/0xaa0 [ 1729.237143][T23208] __do_page_fault+0x536/0xdd0 [ 1729.237169][T23208] do_page_fault+0x38/0x590 [ 1729.237190][T23208] page_fault+0x39/0x40 [ 1729.237201][T23208] RIP: 0033:0x430b36 [ 1729.237218][T23208] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 44 64 00 85 c0 0f 84 [ 1729.237231][T23208] RSP: 002b:00007ffd975cd240 EFLAGS: 00010206 [ 1729.278882][T23208] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1729.278892][T23208] RDX: 00000000018bc930 RSI: 00000000018c4970 RDI: 0000000000000003 [ 1729.278901][T23208] RBP: 0000000000008041 R08: 0000000000000001 R09: 00000000018bb940 [ 1729.278909][T23208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1729.278918][T23208] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 00:15:24 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1729.533744][T23208] memory: usage 1028kB, limit 0kB, failcnt 783 [ 1729.540063][T23208] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1729.547298][T23208] Memory cgroup stats for /syz5: [ 1729.547398][T23208] anon 4096 [ 1729.547398][T23208] file 12288 [ 1729.547398][T23208] kernel_stack 65536 [ 1729.547398][T23208] slab 802816 [ 1729.547398][T23208] sock 0 [ 1729.547398][T23208] shmem 0 [ 1729.547398][T23208] file_mapped 0 [ 1729.547398][T23208] file_dirty 0 [ 1729.547398][T23208] file_writeback 0 [ 1729.547398][T23208] anon_thp 0 [ 1729.547398][T23208] inactive_anon 0 [ 1729.547398][T23208] active_anon 4096 [ 1729.547398][T23208] inactive_file 0 [ 1729.547398][T23208] active_file 0 [ 1729.547398][T23208] unevictable 0 [ 1729.547398][T23208] slab_reclaimable 135168 [ 1729.547398][T23208] slab_unreclaimable 667648 [ 1729.547398][T23208] pgfault 28380 [ 1729.547398][T23208] pgmajfault 0 [ 1729.547398][T23208] workingset_refault 0 [ 1729.547398][T23208] workingset_activate 0 [ 1729.547398][T23208] workingset_nodereclaim 0 [ 1729.547398][T23208] pgrefill 33 00:15:25 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1729.547398][T23208] pgscan 33 [ 1729.547398][T23208] pgsteal 0 [ 1729.547398][T23208] pgactivate 0 [ 1729.646721][T23208] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=23208,uid=0 00:15:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e000e002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1729.697379][T23208] Memory cgroup out of memory: Killed process 23208 (syz-executor.5) total-vm:72448kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 00:15:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0040002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1729.750434][ T1072] oom_reaper: reaped process 23208 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 00:15:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xfffff000, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) 00:15:25 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1730.142993][T23268] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 00:15:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)}], 0x1}, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r6, 0x0, 0x0) 00:15:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0020002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1730.937519][T23283] IPVS: ftp: loaded support on port[0] = 21 [ 1731.156891][T23283] chnl_net:caif_netlink_parms(): no params data found [ 1731.267852][T23283] bridge0: port 1(bridge_slave_0) entered blocking state [ 1731.275829][T23283] bridge0: port 1(bridge_slave_0) entered disabled state [ 1731.284879][T23283] device bridge_slave_0 entered promiscuous mode [ 1731.294104][T23283] bridge0: port 2(bridge_slave_1) entered blocking state [ 1731.301238][T23283] bridge0: port 2(bridge_slave_1) entered disabled state [ 1731.310645][T23283] device bridge_slave_1 entered promiscuous mode [ 1731.403099][T23283] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1731.415221][T23283] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1731.570295][T23283] team0: Port device team_slave_0 added [ 1731.578942][T23283] team0: Port device team_slave_1 added [ 1731.775893][T23283] device hsr_slave_0 entered promiscuous mode [ 1731.873050][T23283] device hsr_slave_1 entered promiscuous mode [ 1731.922142][T23283] debugfs: Directory 'hsr0' with parent '/' already present! [ 1732.144818][T23283] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1732.165416][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1732.174355][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1732.188443][T23283] 8021q: adding VLAN 0 to HW filter on device team0 [ 1732.255457][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1732.264969][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1732.274450][T22093] bridge0: port 1(bridge_slave_0) entered blocking state [ 1732.281518][T22093] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1732.358621][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1732.367169][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1732.376626][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1732.386384][T12286] bridge0: port 2(bridge_slave_1) entered blocking state [ 1732.393501][T12286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1732.415072][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1732.424943][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1732.487992][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1732.497321][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1732.507093][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1732.517435][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1732.601232][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1732.610843][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1732.625492][T23283] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1732.638113][T23283] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1732.654409][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1732.663882][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1732.779715][T23283] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1733.100454][T23292] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1733.111735][T23292] CPU: 0 PID: 23292 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 1733.119641][T23292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1733.129704][T23292] Call Trace: [ 1733.133011][T23292] dump_stack+0x172/0x1f0 [ 1733.137809][T23292] dump_header+0x10b/0x82d [ 1733.142233][T23292] oom_kill_process.cold+0x10/0x15 [ 1733.147353][T23292] out_of_memory+0x334/0x1340 [ 1733.152042][T23292] ? __sched_text_start+0x8/0x8 [ 1733.156895][T23292] ? oom_killer_disable+0x280/0x280 [ 1733.162107][T23292] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1733.167659][T23292] ? memcg_stat_show+0xc40/0xc40 [ 1733.172609][T23292] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1733.178533][T23292] ? cgroup_file_notify+0x140/0x1b0 [ 1733.183719][T23292] memory_max_write+0x262/0x3a0 [ 1733.188591][T23292] ? mem_cgroup_write+0x370/0x370 [ 1733.193688][T23292] ? lock_acquire+0x20b/0x410 [ 1733.198485][T23292] cgroup_file_write+0x241/0x790 [ 1733.203421][T23292] ? mem_cgroup_write+0x370/0x370 [ 1733.208433][T23292] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1733.214058][T23292] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1733.219675][T23292] kernfs_fop_write+0x2b8/0x480 [ 1733.224569][T23292] __vfs_write+0x8a/0x110 [ 1733.228911][T23292] ? kernfs_fop_open+0xd80/0xd80 [ 1733.233849][T23292] vfs_write+0x268/0x5d0 [ 1733.238167][T23292] ksys_write+0x14f/0x290 [ 1733.242493][T23292] ? __ia32_sys_read+0xb0/0xb0 [ 1733.247262][T23292] ? do_syscall_64+0x26/0x760 [ 1733.251949][T23292] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1733.258006][T23292] ? do_syscall_64+0x26/0x760 [ 1733.262766][T23292] __x64_sys_write+0x73/0xb0 [ 1733.267346][T23292] do_syscall_64+0xfa/0x760 [ 1733.271846][T23292] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1733.277732][T23292] RIP: 0033:0x459a59 [ 1733.281611][T23292] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1733.301827][T23292] RSP: 002b:00007f761f9dbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1733.310227][T23292] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 1733.318194][T23292] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1733.326182][T23292] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1733.334151][T23292] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f761f9dc6d4 [ 1733.342121][T23292] R13: 00000000004c9ef3 R14: 00000000004e1c48 R15: 00000000ffffffff [ 1733.366938][T23292] memory: usage 3544kB, limit 0kB, failcnt 463 [ 1733.373446][T23292] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1733.380517][T23292] Memory cgroup stats for /syz4: [ 1733.381758][T23292] anon 2187264 [ 1733.381758][T23292] file 40960 [ 1733.381758][T23292] kernel_stack 0 [ 1733.381758][T23292] slab 1105920 [ 1733.381758][T23292] sock 0 [ 1733.381758][T23292] shmem 0 [ 1733.381758][T23292] file_mapped 0 [ 1733.381758][T23292] file_dirty 0 [ 1733.381758][T23292] file_writeback 0 [ 1733.381758][T23292] anon_thp 2097152 [ 1733.381758][T23292] inactive_anon 0 [ 1733.381758][T23292] active_anon 2187264 [ 1733.381758][T23292] inactive_file 131072 [ 1733.381758][T23292] active_file 0 [ 1733.381758][T23292] unevictable 0 [ 1733.381758][T23292] slab_reclaimable 270336 [ 1733.381758][T23292] slab_unreclaimable 835584 [ 1733.381758][T23292] pgfault 38082 [ 1733.381758][T23292] pgmajfault 0 [ 1733.381758][T23292] workingset_refault 0 [ 1733.381758][T23292] workingset_activate 0 [ 1733.381758][T23292] workingset_nodereclaim 0 [ 1733.381758][T23292] pgrefill 69 [ 1733.381758][T23292] pgscan 5378 [ 1733.381758][T23292] pgsteal 5230 [ 1733.381758][T23292] pgactivate 99 [ 1733.478476][T23292] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=23290,uid=0 [ 1733.495679][T23292] Memory cgroup out of memory: Killed process 23290 (syz-executor.4) total-vm:72580kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 1733.517815][ T1072] oom_reaper: reaped process 23290 (syz-executor.4), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB 00:15:29 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r5 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r5, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r5, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r4, 0x0, 0x0) 00:15:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0048002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:15:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r1 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r2 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r2, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0xfffff000, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) 00:15:29 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:15:29 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r7 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c127", 0x2}], 0x1}, 0xfc00) sendmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r6, 0x0, 0x0) 00:15:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0040002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1733.728124][T23283] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1733.779654][T23283] CPU: 1 PID: 23283 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 1733.787583][T23283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1733.797646][T23283] Call Trace: [ 1733.800944][T23283] dump_stack+0x172/0x1f0 [ 1733.805375][T23283] dump_header+0x10b/0x82d [ 1733.809807][T23283] ? oom_kill_process+0x94/0x3f0 [ 1733.814758][T23283] oom_kill_process.cold+0x10/0x15 [ 1733.819911][T23283] out_of_memory+0x334/0x1340 [ 1733.824629][T23283] ? lock_downgrade+0x920/0x920 [ 1733.829495][T23283] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 1733.835323][T23283] ? oom_killer_disable+0x280/0x280 [ 1733.840625][T23283] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1733.846184][T23283] ? memcg_stat_show+0xc40/0xc40 [ 1733.851142][T23283] ? do_raw_spin_unlock+0x57/0x270 [ 1733.856269][T23283] ? _raw_spin_unlock+0x2d/0x50 [ 1733.861138][T23283] try_charge+0xf4b/0x1440 [ 1733.865576][T23283] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1733.871135][T23283] ? percpu_ref_tryget_live+0x111/0x290 [ 1733.876693][T23283] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1733.882971][T23283] ? __kasan_check_read+0x11/0x20 [ 1733.888014][T23283] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1733.893578][T23283] mem_cgroup_try_charge+0x136/0x590 [ 1733.898884][T23283] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1733.904711][T23283] wp_page_copy+0x407/0x1860 [ 1733.909315][T23283] ? find_held_lock+0x35/0x130 [ 1733.914101][T23283] ? do_wp_page+0x53b/0x15c0 [ 1733.918705][T23283] ? pmd_devmap_trans_unstable+0x220/0x220 [ 1733.924524][T23283] ? lock_downgrade+0x920/0x920 [ 1733.929392][T23283] ? swp_swapcount+0x540/0x540 [ 1733.934305][T23283] ? __kasan_check_read+0x11/0x20 [ 1733.939348][T23283] ? do_raw_spin_unlock+0x57/0x270 [ 1733.944523][T23283] do_wp_page+0x543/0x15c0 [ 1733.948973][T23283] ? finish_mkwrite_fault+0x6a0/0x6a0 [ 1733.954389][T23283] __handle_mm_fault+0x23ec/0x4040 [ 1733.959517][T23283] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1733.965080][T23283] ? handle_mm_fault+0x292/0xaa0 [ 1733.970045][T23283] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1733.976306][T23283] ? __kasan_check_read+0x11/0x20 [ 1733.981362][T23283] handle_mm_fault+0x3b7/0xaa0 [ 1733.986252][T23283] __do_page_fault+0x536/0xdd0 [ 1733.991140][T23283] do_page_fault+0x38/0x590 [ 1733.995667][T23283] page_fault+0x39/0x40 [ 1733.996823][T23298] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1733.999820][T23283] RIP: 0033:0x430b36 00:15:29 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1733.999846][T23283] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 66 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 44 64 00 85 c0 0f 84 [ 1734.032600][T23283] RSP: 002b:00007ffcbeb404b0 EFLAGS: 00010206 [ 1734.038671][T23283] RAX: 0000000000019691 RBX: 0000000000716640 RCX: 0000000000008041 [ 1734.046656][T23283] RDX: 00000000021f9930 RSI: 0000000002201970 RDI: 0000000000000003 [ 1734.054680][T23283] RBP: 0000000000008041 R08: 0000000000000001 R09: 00000000021f8940 [ 1734.062667][T23283] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000716698 [ 1734.070648][T23283] R13: 0000000000716698 R14: 0000000000000000 R15: 0000000000002710 00:15:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e004c002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1734.138911][T23283] memory: usage 1212kB, limit 0kB, failcnt 471 [ 1734.163295][T23283] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1734.212573][T23283] Memory cgroup stats for /syz4: [ 1734.212674][T23283] anon 40960 [ 1734.212674][T23283] file 40960 [ 1734.212674][T23283] kernel_stack 0 [ 1734.212674][T23283] slab 1105920 [ 1734.212674][T23283] sock 0 [ 1734.212674][T23283] shmem 0 [ 1734.212674][T23283] file_mapped 0 [ 1734.212674][T23283] file_dirty 0 [ 1734.212674][T23283] file_writeback 0 [ 1734.212674][T23283] anon_thp 0 [ 1734.212674][T23283] inactive_anon 0 [ 1734.212674][T23283] active_anon 40960 [ 1734.212674][T23283] inactive_file 131072 00:15:29 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1734.212674][T23283] active_file 0 [ 1734.212674][T23283] unevictable 0 [ 1734.212674][T23283] slab_reclaimable 270336 [ 1734.212674][T23283] slab_unreclaimable 835584 [ 1734.212674][T23283] pgfault 38082 [ 1734.212674][T23283] pgmajfault 0 [ 1734.212674][T23283] workingset_refault 0 [ 1734.212674][T23283] workingset_activate 0 [ 1734.212674][T23283] workingset_nodereclaim 0 [ 1734.212674][T23283] pgrefill 69 [ 1734.212674][T23283] pgscan 5378 [ 1734.212674][T23283] pgsteal 5230 [ 1734.212674][T23283] pgactivate 99 00:15:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0048002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1734.444878][T23283] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=23283,uid=0 [ 1734.507777][T23283] Memory cgroup out of memory: Killed process 23283 (syz-executor.4) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 [ 1734.546394][ T1072] oom_reaper: reaped process 23283 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 00:15:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r1 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r2 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r2, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0xfffff000, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) 00:15:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e004c002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1734.868053][T23335] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 00:15:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0060002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/255, 0xff}], 0x9, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:15:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x10) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) sendmsg(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20) r6 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000001) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0xcc539d13aa130b24, 0x0) write$cgroup_int(r5, 0x0, 0x0) 00:15:30 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:15:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r2 = socket$kcm(0x10, 0x7, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0060002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)={&(0x7f0000000040)='./file0\x00'}, 0x10) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f00000000c0)=""/42, 0x2a}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000005c0)=""/79, 0x4f}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/146, 0x92}], 0x8, &(0x7f00000009c0)=""/123, 0x7b}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) [ 1735.408276][T23341] IPVS: ftp: loaded support on port[0] = 21 [ 1735.906236][T23341] chnl_net:caif_netlink_parms(): no params data found [ 1735.952923][T23341] bridge0: port 1(bridge_slave_0) entered blocking state [ 1735.960074][T23341] bridge0: port 1(bridge_slave_0) entered disabled state [ 1735.968894][T23341] device bridge_slave_0 entered promiscuous mode [ 1735.977918][T23341] bridge0: port 2(bridge_slave_1) entered blocking state [ 1735.985783][T23341] bridge0: port 2(bridge_slave_1) entered disabled state [ 1736.002473][T23341] device bridge_slave_1 entered promiscuous mode [ 1736.081554][T23341] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1736.094029][T23341] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1736.118340][T23341] team0: Port device team_slave_0 added [ 1736.126304][T23341] team0: Port device team_slave_1 added [ 1736.205912][T23341] device hsr_slave_0 entered promiscuous mode [ 1736.263079][T23341] device hsr_slave_1 entered promiscuous mode [ 1736.312613][T23341] debugfs: Directory 'hsr0' with parent '/' already present! [ 1736.528855][T23341] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1736.593554][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1736.602441][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1736.615158][T23341] 8021q: adding VLAN 0 to HW filter on device team0 [ 1736.631530][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1736.641064][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1736.650053][T22087] bridge0: port 1(bridge_slave_0) entered blocking state [ 1736.657177][T22087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1736.715908][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1736.732934][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1736.742543][T22087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1736.751120][T22087] bridge0: port 2(bridge_slave_1) entered blocking state [ 1736.758232][T22087] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1736.783340][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1736.793959][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1736.804379][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1736.815373][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1736.887720][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1736.896190][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1736.905896][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1736.924936][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1736.934430][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1736.944136][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1736.953504][T12286] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1736.975623][T23341] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1737.044436][ T9005] device bridge_slave_1 left promiscuous mode [ 1737.050706][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1737.074637][ T9005] device bridge_slave_0 left promiscuous mode [ 1737.080889][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1737.164466][ T9005] device bridge_slave_1 left promiscuous mode [ 1737.170692][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1737.233474][ T9005] device bridge_slave_0 left promiscuous mode [ 1737.239691][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1737.294557][ T9005] device bridge_slave_1 left promiscuous mode [ 1737.300777][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1737.345452][ T9005] device bridge_slave_0 left promiscuous mode [ 1737.351678][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1737.444629][ T9005] device bridge_slave_1 left promiscuous mode [ 1737.450853][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1737.514008][ T9005] device bridge_slave_0 left promiscuous mode [ 1737.520218][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1737.574569][ T9005] device bridge_slave_1 left promiscuous mode [ 1737.580800][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1737.633457][ T9005] device bridge_slave_0 left promiscuous mode [ 1737.639672][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1737.694574][ T9005] device bridge_slave_1 left promiscuous mode [ 1737.700789][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1737.763712][ T9005] device bridge_slave_0 left promiscuous mode [ 1737.769968][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1737.854343][ T9005] device bridge_slave_1 left promiscuous mode [ 1737.860566][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1738.003388][ T9005] device bridge_slave_0 left promiscuous mode [ 1738.009619][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1738.083159][ T9005] device bridge_slave_1 left promiscuous mode [ 1738.089617][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1738.143904][ T9005] device bridge_slave_0 left promiscuous mode [ 1738.150840][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1738.274502][ T9005] device bridge_slave_1 left promiscuous mode [ 1738.280736][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1738.383870][ T9005] device bridge_slave_0 left promiscuous mode [ 1738.390105][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1738.534476][ T9005] device bridge_slave_1 left promiscuous mode [ 1738.540714][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1738.643329][ T9005] device bridge_slave_0 left promiscuous mode [ 1738.649747][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1738.724336][ T9005] device bridge_slave_1 left promiscuous mode [ 1738.730581][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1738.793304][ T9005] device bridge_slave_0 left promiscuous mode [ 1738.799589][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1738.874457][ T9005] device bridge_slave_1 left promiscuous mode [ 1738.880697][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1738.963218][ T9005] device bridge_slave_0 left promiscuous mode [ 1738.969478][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1739.054403][ T9005] device bridge_slave_1 left promiscuous mode [ 1739.060652][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1739.163478][ T9005] device bridge_slave_0 left promiscuous mode [ 1739.169716][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1739.284396][ T9005] device bridge_slave_1 left promiscuous mode [ 1739.290643][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1739.333520][ T9005] device bridge_slave_0 left promiscuous mode [ 1739.339756][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1739.434494][ T9005] device bridge_slave_1 left promiscuous mode [ 1739.440714][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1739.483379][ T9005] device bridge_slave_0 left promiscuous mode [ 1739.489612][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1739.574591][ T9005] device bridge_slave_1 left promiscuous mode [ 1739.580822][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1739.633427][ T9005] device bridge_slave_0 left promiscuous mode [ 1739.640012][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1739.714410][ T9005] device bridge_slave_1 left promiscuous mode [ 1739.720648][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1739.833355][ T9005] device bridge_slave_0 left promiscuous mode [ 1739.839792][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1739.924412][ T9005] device bridge_slave_1 left promiscuous mode [ 1739.930644][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1740.022643][ T9005] device bridge_slave_0 left promiscuous mode [ 1740.028916][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1740.075442][ T9005] device bridge_slave_1 left promiscuous mode [ 1740.081685][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1740.113742][ T9005] device bridge_slave_0 left promiscuous mode [ 1740.119970][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1740.164441][ T9005] device bridge_slave_1 left promiscuous mode [ 1740.170786][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1740.285260][ T9005] device bridge_slave_0 left promiscuous mode [ 1740.291480][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1740.354352][ T9005] device bridge_slave_1 left promiscuous mode [ 1740.360578][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1740.443282][ T9005] device bridge_slave_0 left promiscuous mode [ 1740.449524][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1740.514567][ T9005] device bridge_slave_1 left promiscuous mode [ 1740.520803][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1740.573455][ T9005] device bridge_slave_0 left promiscuous mode [ 1740.579680][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1740.714478][ T9005] device bridge_slave_1 left promiscuous mode [ 1740.720807][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1740.793858][ T9005] device bridge_slave_0 left promiscuous mode [ 1740.800112][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1740.855307][ T9005] device bridge_slave_1 left promiscuous mode [ 1740.861540][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1740.913608][ T9005] device bridge_slave_0 left promiscuous mode [ 1740.919845][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1740.974688][ T9005] device bridge_slave_1 left promiscuous mode [ 1740.980930][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1741.033401][ T9005] device bridge_slave_0 left promiscuous mode [ 1741.039654][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1741.134571][ T9005] device bridge_slave_1 left promiscuous mode [ 1741.140818][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1741.264733][ T9005] device bridge_slave_0 left promiscuous mode [ 1741.270963][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1741.354518][ T9005] device bridge_slave_1 left promiscuous mode [ 1741.360757][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1741.413311][ T9005] device bridge_slave_0 left promiscuous mode [ 1741.419579][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1741.494447][ T9005] device bridge_slave_1 left promiscuous mode [ 1741.500694][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1741.543621][ T9005] device bridge_slave_0 left promiscuous mode [ 1741.549847][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1741.604312][ T9005] device bridge_slave_1 left promiscuous mode [ 1741.610541][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1741.653380][ T9005] device bridge_slave_0 left promiscuous mode [ 1741.659796][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1741.744274][ T9005] device bridge_slave_1 left promiscuous mode [ 1741.750520][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1741.803347][ T9005] device bridge_slave_0 left promiscuous mode [ 1741.809584][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1741.934467][ T9005] device bridge_slave_1 left promiscuous mode [ 1741.940742][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1742.033279][ T9005] device bridge_slave_0 left promiscuous mode [ 1742.039526][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1742.084392][ T9005] device bridge_slave_1 left promiscuous mode [ 1742.090624][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1742.153411][ T9005] device bridge_slave_0 left promiscuous mode [ 1742.159644][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1742.244363][ T9005] device bridge_slave_1 left promiscuous mode [ 1742.250614][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1742.303220][ T9005] device bridge_slave_0 left promiscuous mode [ 1742.309444][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1742.374422][ T9005] device bridge_slave_1 left promiscuous mode [ 1742.380653][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1742.473338][ T9005] device bridge_slave_0 left promiscuous mode [ 1742.479588][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1742.524431][ T9005] device bridge_slave_1 left promiscuous mode [ 1742.530660][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1742.583979][ T9005] device bridge_slave_0 left promiscuous mode [ 1742.590230][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1742.644463][ T9005] device bridge_slave_1 left promiscuous mode [ 1742.650706][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1742.703298][ T9005] device bridge_slave_0 left promiscuous mode [ 1742.709522][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1742.844379][ T9005] device bridge_slave_1 left promiscuous mode [ 1742.850678][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1742.923364][ T9005] device bridge_slave_0 left promiscuous mode [ 1742.929609][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1742.984374][ T9005] device bridge_slave_1 left promiscuous mode [ 1742.990597][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1743.083361][ T9005] device bridge_slave_0 left promiscuous mode [ 1743.089605][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1743.214364][ T9005] device bridge_slave_1 left promiscuous mode [ 1743.220591][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1743.283374][ T9005] device bridge_slave_0 left promiscuous mode [ 1743.289696][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1743.354480][ T9005] device bridge_slave_1 left promiscuous mode [ 1743.360700][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1743.433347][ T9005] device bridge_slave_0 left promiscuous mode [ 1743.439580][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1743.494380][ T9005] device bridge_slave_1 left promiscuous mode [ 1743.500690][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1743.593260][ T9005] device bridge_slave_0 left promiscuous mode [ 1743.599477][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1743.754092][ T9005] device bridge_slave_1 left promiscuous mode [ 1743.760323][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1743.843341][ T9005] device bridge_slave_0 left promiscuous mode [ 1743.849683][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1743.964643][ T9005] device bridge_slave_1 left promiscuous mode [ 1743.970907][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1744.013291][ T9005] device bridge_slave_0 left promiscuous mode [ 1744.019523][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1744.084374][ T9005] device bridge_slave_1 left promiscuous mode [ 1744.093439][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1744.163281][ T9005] device bridge_slave_0 left promiscuous mode [ 1744.169517][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1744.244391][ T9005] device bridge_slave_1 left promiscuous mode [ 1744.250627][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1744.303355][ T9005] device bridge_slave_0 left promiscuous mode [ 1744.309601][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1744.364427][ T9005] device bridge_slave_1 left promiscuous mode [ 1744.371707][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1744.473262][ T9005] device bridge_slave_0 left promiscuous mode [ 1744.479495][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1744.554331][ T9005] device bridge_slave_1 left promiscuous mode [ 1744.560562][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1744.643330][ T9005] device bridge_slave_0 left promiscuous mode [ 1744.649572][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1744.733717][ T9005] device bridge_slave_1 left promiscuous mode [ 1744.739954][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1744.783261][ T9005] device bridge_slave_0 left promiscuous mode [ 1744.789627][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1744.844700][ T9005] device bridge_slave_1 left promiscuous mode [ 1744.850944][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1744.893285][ T9005] device bridge_slave_0 left promiscuous mode [ 1744.899516][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1745.034581][ T9005] device bridge_slave_1 left promiscuous mode [ 1745.040826][ T9005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1745.133414][ T9005] device bridge_slave_0 left promiscuous mode [ 1745.139664][ T9005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1889.282542][ T9005] device hsr_slave_0 left promiscuous mode [ 1889.352150][ T9005] device hsr_slave_1 left promiscuous mode [ 1889.454423][ T9005] team0 (unregistering): Port device team_slave_1 removed [ 1889.470036][ T9005] team0 (unregistering): Port device team_slave_0 removed [ 1889.485499][ T9005] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1889.540425][ T9005] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1889.674340][ T9005] bond0 (unregistering): Released all slaves [ 1889.862905][ T9005] device hsr_slave_0 left promiscuous mode [ 1890.002317][ T9005] device hsr_slave_1 left promiscuous mode [ 1890.075135][ T9005] team0 (unregistering): Port device team_slave_1 removed [ 1890.090481][ T9005] team0 (unregistering): Port device team_slave_0 removed [ 1890.106239][ T9005] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1890.230695][ T9005] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1890.411671][ T9005] bond0 (unregistering): Released all slaves [ 1890.703689][ T9005] device hsr_slave_0 left promiscuous mode [ 1890.812555][ T9005] device hsr_slave_1 left promiscuous mode [ 1890.903529][ T9005] team0 (unregistering): Port device team_slave_1 removed [ 1890.918949][ T9005] team0 (unregistering): Port device team_slave_0 removed [ 1890.935346][ T9005] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1890.980584][ T9005] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1891.105908][ T9005] bond0 (unregistering): Released all slaves [ 1891.362895][ T9005] device hsr_slave_0 left promiscuous mode [ 1891.422264][ T9005] device hsr_slave_1 left promiscuous mode [ 1891.570827][ T9005] team0 (unregistering): Port device team_slave_1 removed [ 1891.589504][ T9005] team0 (unregistering): Port device team_slave_0 removed [ 1891.606692][ T9005] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1891.720312][ T9005] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1891.880844][ T9005] bond0 (unregistering): Released all slaves [ 1892.133167][ T9005] device hsr_slave_0 left promiscuous mode [ 1892.252189][ T9005] device hsr_slave_1 left promiscuous mode [ 1892.410632][ T9005] team0 (unregistering): Port device team_slave_1 removed [ 1892.428168][ T9005] team0 (unregistering): Port device team_slave_0 removed [ 1892.446849][ T9005] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1892.551021][ T9005] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1892.767730][ T9005] bond0 (unregistering): Released all slaves [ 1892.943026][ T9005] device hsr_slave_0 left promiscuous mode [ 1892.992210][ T9005] device hsr_slave_1 left promiscuous mode [ 1893.064935][ T9005] team0 (unregistering): Port device team_slave_1 removed [ 1893.080505][ T9005] team0 (unregistering): Port device team_slave_0 removed [ 1893.098935][ T9005] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1893.170275][ T9005] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1893.269075][ T9005] bond0 (unregistering): Released all slaves [ 1893.452968][ T9005] device hsr_slave_0 left promiscuous mode [ 1893.532555][ T9005] device hsr_slave_1 left promiscuous mode [ 1893.631645][ T9005] team0 (unregistering): Port device team_slave_1 removed [ 1893.648887][ T9005] team0 (unregistering): Port device team_slave_0 removed [ 1893.668752][ T9005] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1893.790683][ T9005] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1893.978817][ T9005] bond0 (unregistering): Released all slaves [ 1894.213021][ T9005] device hsr_slave_0 left promiscuous mode [ 1894.292266][ T9005] device hsr_slave_1 left promiscuous mode [ 1894.350718][ T9005] team0 (unregistering): Port device team_slave_1 removed [ 1894.368598][ T9005] team0 (unregistering): Port device team_slave_0 removed [ 1894.387238][ T9005] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1894.460046][ T9005] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1894.596417][ T9005] bond0 (unregistering): Released all slaves [ 1894.793900][ T9005] device hsr_slave_0 left promiscuous mode [ 1894.863012][ T9005] device hsr_slave_1 left promiscuous mode [ 1894.927535][ T9005] team0 (unregistering): Port device team_slave_1 removed [ 1894.944383][ T9005] team0 (unregistering): Port device team_slave_0 removed [ 1894.959485][ T9005] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1895.020615][ T9005] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1895.156633][ T9005] bond0 (unregistering): Released all slaves [ 1895.442926][ T9005] device hsr_slave_0 left promiscuous mode [ 1895.522277][ T9005] device hsr_slave_1 left promiscuous mode [ 1895.626588][ T9005] team0 (unregistering): Port device team_slave_1 removed [ 1895.644596][ T9005] team0 (unregistering): Port device team_slave_0 removed [ 1895.660016][ T9005] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1895.720527][ T9005] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1895.924935][ T9005] bond0 (unregistering): Released all slaves [ 1896.162924][ T9005] device hsr_slave_0 left promiscuous mode [ 1896.272301][ T9005] device hsr_slave_1 left promiscuous mode [ 1896.350818][ T9005] team0 (unregistering): Port device team_slave_1 removed [ 1896.376417][ T9005] team0 (unregistering): Port device team_slave_0 removed [ 1896.395200][ T9005] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1896.460213][ T9005] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1896.571897][ T9005] bond0 (unregistering): Released all slaves [ 1896.872913][ T9005] device hsr_slave_0 left promiscuous mode [ 1896.912399][ T9005] device hsr_slave_1 left promiscuous mode [ 1896.981171][ T9005] team0 (unregistering): Port device team_slave_1 removed [ 1896.998830][ T9005] team0 (unregistering): Port device team_slave_0 removed [ 1897.016904][ T9005] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1897.026142][ T1071] INFO: task kworker/1:4:12286 blocked for more than 143 seconds. [ 1897.034863][ T1071] Not tainted 5.4.0-rc1+ #0 [ 1897.040170][ T1071] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1897.049281][ T1071] kworker/1:4 D26832 12286 2 0x80004000 [ 1897.056134][ T1071] Workqueue: events linkwatch_event [ 1897.061335][ T1071] Call Trace: [ 1897.065047][ T1071] __schedule+0x94f/0x1e70 [ 1897.069473][ T1071] ? __sched_text_start+0x8/0x8 [ 1897.074775][ T1071] ? __kasan_check_read+0x11/0x20 [ 1897.079815][ T1071] ? _raw_spin_unlock_irq+0x5e/0x90 [ 1897.085455][ T1071] schedule+0xd9/0x260 [ 1897.089536][ T1071] schedule_preempt_disabled+0x13/0x20 [ 1897.097536][ T1071] __mutex_lock+0x7b0/0x13c0 [ 1897.102732][ T1071] ? rtnl_lock+0x17/0x20 [ 1897.106985][ T1071] ? mutex_trylock+0x2d0/0x2d0 [ 1897.111758][ T1071] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1897.118442][ T1071] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1897.125022][ T1071] mutex_lock_nested+0x16/0x20 [ 1897.129787][ T1071] ? mutex_lock_nested+0x16/0x20 [ 1897.135104][ T1071] rtnl_lock+0x17/0x20 [ 1897.139183][ T1071] linkwatch_event+0xf/0x70 [ 1897.144112][ T1071] process_one_work+0x9af/0x1740 [ 1897.149074][ T1071] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1897.154829][ T1071] ? lock_acquire+0x190/0x410 [ 1897.159525][ T1071] worker_thread+0x98/0xe40 [ 1897.164560][ T1071] kthread+0x361/0x430 [ 1897.168646][ T1071] ? process_one_work+0x1740/0x1740 [ 1897.174220][ T1071] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1897.180504][ T1071] ret_from_fork+0x24/0x30 [ 1897.185586][ T1071] INFO: task kworker/1:27:22087 blocked for more than 143 seconds. [ 1897.196323][ T9005] kobject: 'batman_adv' (0000000086451271): kobject_uevent_env [ 1897.204030][ T1071] Not tainted 5.4.0-rc1+ #0 [ 1897.209054][ T1071] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1897.218163][ T9005] kobject: 'batman_adv' (0000000086451271): kobject_uevent_env: filter function caused the event to drop! [ 1897.229942][ T9005] kobject: 'batman_adv' (0000000086451271): kobject_cleanup, parent 000000002845de56 [ 1897.232110][ T1071] kworker/1:27 D27000 22087 2 0x80004000 [ 1897.246129][ T1071] Workqueue: ipv6_addrconf addrconf_dad_work [ 1897.252031][ T9005] kobject: 'batman_adv' (0000000086451271): calling ktype release [ 1897.252640][ T1071] Call Trace: [ 1897.259946][ T9005] kobject: (0000000086451271): dynamic_kobj_release [ 1897.264909][ T1071] __schedule+0x94f/0x1e70 [ 1897.270616][ T9005] kobject: 'batman_adv': free name [ 1897.275330][ T1071] ? __sched_text_start+0x8/0x8 [ 1897.280270][ T9005] kobject: 'rx-0' (0000000053b2e74d): kobject_cleanup, parent 00000000742c5523 [ 1897.285275][ T1071] ? __kasan_check_read+0x11/0x20 [ 1897.294062][ T9005] kobject: 'rx-0' (0000000053b2e74d): auto cleanup 'remove' event [ 1897.307081][ T1071] ? _raw_spin_unlock_irq+0x5e/0x90 [ 1897.312400][ T9005] kobject: 'rx-0' (0000000053b2e74d): kobject_uevent_env [ 1897.319423][ T9005] kobject: 'rx-0' (0000000053b2e74d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1897.330274][ T1071] schedule+0xd9/0x260 [ 1897.334472][ T1071] schedule_preempt_disabled+0x13/0x20 [ 1897.339932][ T1071] __mutex_lock+0x7b0/0x13c0 [ 1897.344629][ T9005] kobject: 'rx-0' (0000000053b2e74d): auto cleanup kobject_del [ 1897.352290][ T1071] ? rtnl_lock+0x17/0x20 [ 1897.356574][ T1071] ? mutex_trylock+0x2d0/0x2d0 [ 1897.361446][ T1071] ? mark_lock+0xc2/0x1220 [ 1897.362202][ T9005] kobject: 'rx-0' (0000000053b2e74d): calling ktype release [ 1897.366334][ T1071] mutex_lock_nested+0x16/0x20 [ 1897.373312][ T9005] kobject: 'rx-0': free name [ 1897.382041][ T1071] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1897.382685][ T9005] kobject: 'tx-0' (00000000d4829420): kobject_cleanup, parent 00000000742c5523 [ 1897.388799][ T1071] ? mutex_lock_nested+0x16/0x20 [ 1897.388816][ T1071] rtnl_lock+0x17/0x20 [ 1897.398633][ T9005] kobject: 'tx-0' (00000000d4829420): auto cleanup 'remove' event [ 1897.414778][ T9005] kobject: 'tx-0' (00000000d4829420): kobject_uevent_env [ 1897.422095][ T1071] addrconf_dad_work+0xad/0x1150 [ 1897.422582][ T9005] kobject: 'tx-0' (00000000d4829420): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1897.427066][ T1071] ? addrconf_dad_completed+0xbb0/0xbb0 [ 1897.442036][ T9005] kobject: 'tx-0' (00000000d4829420): auto cleanup kobject_del [ 1897.443568][ T1071] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1897.451070][ T9005] kobject: 'tx-0' (00000000d4829420): calling ktype release [ 1897.464505][ T9005] kobject: 'tx-0': free name [ 1897.469127][ T9005] kobject: 'queues' (00000000742c5523): kobject_cleanup, parent 000000002845de56 [ 1897.472051][ T1071] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1897.478653][ T9005] kobject: 'queues' (00000000742c5523): calling ktype release [ 1897.493940][ T9005] kobject: 'queues' (00000000742c5523): kset_release [ 1897.500621][ T9005] kobject: 'queues': free name [ 1897.502009][ T1071] ? trace_hardirqs_on+0x67/0x240 [ 1897.506600][ T9005] kobject: 'bond_slave_1' (00000000797dcd00): kobject_uevent_env [ 1897.510435][ T1071] process_one_work+0x9af/0x1740 [ 1897.523879][ T1071] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1897.529258][ T1071] ? lock_acquire+0x190/0x410 [ 1897.532093][ T9005] kobject: 'bond_slave_1' (00000000797dcd00): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1897.534552][ T1071] worker_thread+0x98/0xe40 [ 1897.550498][ T1071] kthread+0x361/0x430 [ 1897.554963][ T1071] ? process_one_work+0x1740/0x1740 [ 1897.560173][ T1071] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1897.564262][ T9005] kobject: 'batman_adv' (00000000180b2ed3): kobject_uevent_env [ 1897.568253][ T1071] ret_from_fork+0x24/0x30 [ 1897.578951][ T1071] INFO: task kworker/0:3:22357 blocked for more than 143 seconds. [ 1897.583411][ T9005] kobject: 'batman_adv' (00000000180b2ed3): kobject_uevent_env: filter function caused the event to drop! [ 1897.588445][ T1071] Not tainted 5.4.0-rc1+ #0 [ 1897.598299][ T9005] kobject: 'batman_adv' (00000000180b2ed3): kobject_cleanup, parent 000000002845de56 [ 1897.612784][ T9005] kobject: 'batman_adv' (00000000180b2ed3): calling ktype release [ 1897.620594][ T9005] kobject: (00000000180b2ed3): dynamic_kobj_release [ 1897.621985][ T1071] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1897.627608][ T9005] kobject: 'batman_adv': free name [ 1897.641608][ T9005] kobject: 'rx-0' (000000000bf26991): kobject_cleanup, parent 000000007ee1c7c4 [ 1897.650948][ T9005] kobject: 'rx-0' (000000000bf26991): auto cleanup 'remove' event [ 1897.651986][ T1071] kworker/0:3 D27000 22357 2 0x80004000 [ 1897.659987][ T9005] kobject: 'rx-0' (000000000bf26991): kobject_uevent_env [ 1897.672850][ T1071] Workqueue: ipv6_addrconf addrconf_dad_work [ 1897.678832][ T1071] Call Trace: [ 1897.682553][ T9005] kobject: 'rx-0' (000000000bf26991): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1897.693695][ T1071] __schedule+0x94f/0x1e70 [ 1897.698124][ T1071] ? __sched_text_start+0x8/0x8 [ 1897.703407][ T9005] kobject: 'rx-0' (000000000bf26991): auto cleanup kobject_del [ 1897.711051][ T9005] kobject: 'rx-0' (000000000bf26991): calling ktype release [ 1897.718951][ T1071] ? __kasan_check_read+0x11/0x20 [ 1897.724391][ T1071] ? _raw_spin_unlock_irq+0x5e/0x90 [ 1897.729608][ T1071] schedule+0xd9/0x260 [ 1897.734084][ T9005] kobject: 'rx-0': free name [ 1897.738756][ T9005] kobject: 'tx-0' (000000009a0decff): kobject_cleanup, parent 000000007ee1c7c4 [ 1897.748153][ T1071] schedule_preempt_disabled+0x13/0x20 [ 1897.754008][ T1071] __mutex_lock+0x7b0/0x13c0 [ 1897.758614][ T1071] ? rtnl_lock+0x17/0x20 [ 1897.763187][ T9005] kobject: 'tx-0' (000000009a0decff): auto cleanup 'remove' event [ 1897.770996][ T9005] kobject: 'tx-0' (000000009a0decff): kobject_uevent_env [ 1897.772120][ T1071] ? mutex_trylock+0x2d0/0x2d0 [ 1897.778605][ T9005] kobject: 'tx-0' (000000009a0decff): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1897.795064][ T9005] kobject: 'tx-0' (000000009a0decff): auto cleanup kobject_del [ 1897.802012][ T1071] ? mark_lock+0xc2/0x1220 [ 1897.803190][ T9005] kobject: 'tx-0' (000000009a0decff): calling ktype release [ 1897.807167][ T1071] mutex_lock_nested+0x16/0x20 [ 1897.814893][ T9005] kobject: 'tx-0': free name [ 1897.824463][ T9005] kobject: 'queues' (000000007ee1c7c4): kobject_cleanup, parent 000000002845de56 [ 1897.832684][ T1071] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1897.833989][ T9005] kobject: 'queues' (000000007ee1c7c4): calling ktype release [ 1897.839853][ T1071] ? mutex_lock_nested+0x16/0x20 [ 1897.847726][ T9005] kobject: 'queues' (000000007ee1c7c4): kset_release [ 1897.859318][ T9005] kobject: 'queues': free name [ 1897.862000][ T1071] rtnl_lock+0x17/0x20 [ 1897.865493][ T9005] kobject: 'veth1_to_bond' (00000000107b0d15): kobject_uevent_env [ 1897.868166][ T1071] addrconf_dad_work+0xad/0x1150 [ 1897.876405][ T9005] kobject: 'veth1_to_bond' (00000000107b0d15): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1897.892012][ T1071] ? addrconf_dad_completed+0xbb0/0xbb0 [ 1897.893689][ T9005] kobject: 'bonding_slave' (000000002dc176bf): kobject_cleanup, parent 00000000eb878a63 [ 1897.898162][ T1071] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1897.908832][ T9005] kobject: 'bonding_slave' (000000002dc176bf): does not have a release() function, it is broken and must be fixed. See Documentation/kobject.txt. [ 1897.929761][ T9005] kobject: 'bonding_slave' (000000002dc176bf): auto cleanup kobject_del [ 1897.938571][ T9005] kobject: 'bonding_slave': free name [ 1897.942217][ T1071] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1897.950000][ T1071] ? trace_hardirqs_on+0x67/0x240 [ 1897.955300][ T1071] process_one_work+0x9af/0x1740 [ 1897.960255][ T1071] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1897.965680][ T1071] ? lock_acquire+0x190/0x410 [ 1897.970400][ T1071] worker_thread+0x98/0xe40 [ 1897.975063][ T1071] kthread+0x361/0x430 [ 1897.979144][ T1071] ? process_one_work+0x1740/0x1740 [ 1897.984491][ T1071] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1897.990748][ T1071] ret_from_fork+0x24/0x30 [ 1897.995473][ T1071] INFO: task kworker/0:5:22358 blocked for more than 144 seconds. [ 1897.995581][ T9005] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1898.003731][ T1071] Not tainted 5.4.0-rc1+ #0 [ 1898.017219][ T1071] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1898.026012][ T1071] kworker/0:5 D27000 22358 2 0x80004000 [ 1898.032522][ T1071] Workqueue: events switchdev_deferred_process_work [ 1898.039112][ T1071] Call Trace: [ 1898.042511][ T1071] __schedule+0x94f/0x1e70 [ 1898.046943][ T1071] ? __sched_text_start+0x8/0x8 [ 1898.051794][ T1071] ? __kasan_check_read+0x11/0x20 [ 1898.056893][ T1071] ? _raw_spin_unlock_irq+0x5e/0x90 [ 1898.062208][ T1071] schedule+0xd9/0x260 [ 1898.066285][ T1071] schedule_preempt_disabled+0x13/0x20 [ 1898.071744][ T1071] __mutex_lock+0x7b0/0x13c0 [ 1898.076435][ T1071] ? rtnl_lock+0x17/0x20 [ 1898.080718][ T1071] ? mutex_trylock+0x2d0/0x2d0 [ 1898.085600][ T1071] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1898.091856][ T1071] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1898.098225][ T1071] mutex_lock_nested+0x16/0x20 [ 1898.103162][ T1071] ? mutex_lock_nested+0x16/0x20 [ 1898.108105][ T1071] rtnl_lock+0x17/0x20 [ 1898.112554][ T1071] switchdev_deferred_process_work+0xe/0x20 [ 1898.118457][ T1071] process_one_work+0x9af/0x1740 [ 1898.123792][ T1071] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1898.129174][ T1071] ? lock_acquire+0x190/0x410 [ 1898.134267][ T1071] worker_thread+0x98/0xe40 [ 1898.138793][ T1071] kthread+0x361/0x430 [ 1898.143279][ T1071] ? process_one_work+0x1740/0x1740 [ 1898.148493][ T1071] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1898.155133][ T1071] ret_from_fork+0x24/0x30 [ 1898.159643][ T1071] INFO: task syz-executor.5:23341 blocked for more than 144 seconds. [ 1898.164933][ T9005] kobject: 'batman_adv' (000000003eee67e9): kobject_uevent_env [ 1898.168258][ T1071] Not tainted 5.4.0-rc1+ #0 [ 1898.180680][ T1071] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1898.190630][ T1071] syz-executor.5 D24008 23341 1 0x00000004 [ 1898.192134][ T9005] kobject: 'batman_adv' (000000003eee67e9): kobject_uevent_env: filter function caused the event to drop! [ 1898.197467][ T1071] Call Trace: [ 1898.212173][ T1071] __schedule+0x94f/0x1e70 [ 1898.216614][ T1071] ? __sched_text_start+0x8/0x8 [ 1898.221465][ T1071] ? lock_downgrade+0x920/0x920 [ 1898.222281][ T9005] kobject: 'batman_adv' (000000003eee67e9): kobject_cleanup, parent 000000002845de56 [ 1898.226823][ T1071] ? rwlock_bug.part.0+0x90/0x90 [ 1898.241127][ T1071] schedule+0xd9/0x260 [ 1898.245541][ T1071] schedule_preempt_disabled+0x13/0x20 [ 1898.251025][ T1071] __mutex_lock+0x7b0/0x13c0 [ 1898.252063][ T9005] kobject: 'batman_adv' (000000003eee67e9): calling ktype release [ 1898.256041][ T1071] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 1898.269040][ T1071] ? mutex_trylock+0x2d0/0x2d0 [ 1898.272060][ T9005] kobject: (000000003eee67e9): dynamic_kobj_release [ 1898.274204][ T1071] ? find_held_lock+0x35/0x130 [ 1898.280390][ T9005] kobject: 'batman_adv': free name [ 1898.290542][ T9005] kobject: 'rx-0' (000000001cbe40aa): kobject_cleanup, parent 000000002c153199 [ 1898.292007][ T1071] ? rtnetlink_rcv_msg+0x3d0/0xb00 [ 1898.299974][ T9005] kobject: 'rx-0' (000000001cbe40aa): auto cleanup 'remove' event [ 1898.312002][ T1071] ? lock_downgrade+0x920/0x920 [ 1898.313713][ T9005] kobject: 'rx-0' (000000001cbe40aa): kobject_uevent_env [ 1898.317320][ T1071] ? rcu_read_lock_held_common+0x130/0x130 [ 1898.330307][ T1071] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1898.332052][ T9005] kobject: 'rx-0' (000000001cbe40aa): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1898.336921][ T1071] mutex_lock_nested+0x16/0x20 [ 1898.352480][ T9005] kobject: 'rx-0' (000000001cbe40aa): auto cleanup kobject_del [ 1898.360084][ T9005] kobject: 'rx-0' (000000001cbe40aa): calling ktype release [ 1898.367771][ T1071] ? mutex_lock_nested+0x16/0x20 [ 1898.373068][ T1071] rtnetlink_rcv_msg+0x40a/0xb00 [ 1898.378025][ T1071] ? rtnl_bridge_getlink+0x910/0x910 [ 1898.383915][ T9005] kobject: 'rx-0': free name [ 1898.388587][ T9005] kobject: 'tx-0' (00000000154bd612): kobject_cleanup, parent 000000002c153199 [ 1898.392218][ T1071] ? lock_downgrade+0x920/0x920 [ 1898.397944][ T9005] kobject: 'tx-0' (00000000154bd612): auto cleanup 'remove' event [ 1898.410357][ T9005] kobject: 'tx-0' (00000000154bd612): kobject_uevent_env [ 1898.417920][ T9005] kobject: 'tx-0' (00000000154bd612): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1898.422108][ T1071] ? netlink_deliver_tap+0x22d/0xbf0 [ 1898.429159][ T9005] kobject: 'tx-0' (00000000154bd612): auto cleanup kobject_del [ 1898.434095][ T1071] ? find_held_lock+0x35/0x130 [ 1898.447397][ T1071] netlink_rcv_skb+0x177/0x450 [ 1898.452295][ T1071] ? rtnl_bridge_getlink+0x910/0x910 [ 1898.453080][ T9005] kobject: 'tx-0' (00000000154bd612): calling ktype release [ 1898.457591][ T1071] ? netlink_ack+0xb50/0xb50 [ 1898.465872][ T9005] kobject: 'tx-0': free name [ 1898.472200][ T1071] ? __kasan_check_read+0x11/0x20 [ 1898.474658][ T9005] kobject: 'queues' (000000002c153199): kobject_cleanup, parent 000000002845de56 [ 1898.479318][ T1071] ? netlink_deliver_tap+0x254/0xbf0 [ 1898.488780][ T9005] kobject: 'queues' (000000002c153199): calling ktype release [ 1898.494106][ T1071] rtnetlink_rcv+0x1d/0x30 [ 1898.505948][ T1071] netlink_unicast+0x531/0x710 [ 1898.510724][ T1071] ? netlink_attachskb+0x7c0/0x7c0 [ 1898.511993][ T9005] kobject: 'queues' (000000002c153199): kset_release [ 1898.515981][ T1071] ? _copy_from_iter_full+0x25d/0x8c0 [ 1898.527919][ T1071] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1898.532001][ T9005] kobject: 'queues': free name [ 1898.533831][ T1071] ? __check_object_size+0x3d/0x437 [ 1898.539651][ T9005] kobject: 'bond_slave_0' (00000000eb878a63): kobject_uevent_env [ 1898.552050][ T9005] kobject: 'bond_slave_0' (00000000eb878a63): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1898.552079][ T1071] netlink_sendmsg+0x8a5/0xd60 [ 1898.568449][ T1071] ? netlink_unicast+0x710/0x710 [ 1898.574419][ T1071] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1898.580025][ T1071] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1898.584188][ T9005] kobject: 'batman_adv' (00000000b0b458c2): kobject_uevent_env [ 1898.585651][ T1071] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1898.599367][ T1071] ? security_socket_sendmsg+0x8d/0xc0 [ 1898.601992][ T9005] kobject: 'batman_adv' (00000000b0b458c2): kobject_uevent_env: filter function caused the event to drop! [ 1898.605196][ T1071] ? netlink_unicast+0x710/0x710 [ 1898.616791][ T9005] kobject: 'batman_adv' (00000000b0b458c2): kobject_cleanup, parent 000000002845de56 [ 1898.631061][ T9005] kobject: 'batman_adv' (00000000b0b458c2): calling ktype release [ 1898.632058][ T1071] sock_sendmsg+0xd7/0x130 [ 1898.643526][ T1071] __sys_sendto+0x262/0x380 [ 1898.648041][ T1071] ? __ia32_sys_getpeername+0xb0/0xb0 [ 1898.652003][ T9005] kobject: (00000000b0b458c2): dynamic_kobj_release [ 1898.654103][ T1071] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1898.660167][ T9005] kobject: 'batman_adv': free name [ 1898.666751][ T1071] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1898.677534][ T1071] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1898.683973][ T9005] kobject: 'rx-0' (0000000069982048): kobject_cleanup, parent 00000000e1536acb [ 1898.693084][ T9005] kobject: 'rx-0' (0000000069982048): auto cleanup 'remove' event [ 1898.700895][ T9005] kobject: 'rx-0' (0000000069982048): kobject_uevent_env [ 1898.702954][ T1071] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1898.708144][ T9005] kobject: 'rx-0' (0000000069982048): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1898.722019][ T1071] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1898.725029][ T9005] kobject: 'rx-0' (0000000069982048): auto cleanup kobject_del [ 1898.730411][ T1071] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1898.738258][ T9005] kobject: 'rx-0' (0000000069982048): calling ktype release [ 1898.751096][ T9005] kobject: 'rx-0': free name [ 1898.756112][ T9005] kobject: 'tx-0' (000000003b606ffe): kobject_cleanup, parent 00000000e1536acb [ 1898.765400][ T9005] kobject: 'tx-0' (000000003b606ffe): auto cleanup 'remove' event [ 1898.772134][ T1071] ? do_syscall_64+0x26/0x760 [ 1898.773769][ T9005] kobject: 'tx-0' (000000003b606ffe): kobject_uevent_env [ 1898.777902][ T1071] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1898.777924][ T1071] __x64_sys_sendto+0xe1/0x1a0 [ 1898.785569][ T9005] kobject: 'tx-0' (000000003b606ffe): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1898.802098][ T1071] do_syscall_64+0xfa/0x760 [ 1898.811498][ T1071] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1898.817938][ T1071] RIP: 0033:0x4138a3 [ 1898.821841][ T1071] Code: 30 44 00 b9 11 00 00 00 48 89 ee f3 a6 75 0c 48 c7 03 b0 39 41 00 e9 1a ff ff ff bf b5 30 44 00 b9 18 00 00 00 48 89 ee f3 a6 <75> 0c 48 c7 03 10 37 41 00 e9 fd fe ff ff bf cd 30 44 00 b9 0a 00 [ 1898.821995][ T9005] kobject: 'tx-0' (000000003b606ffe): auto cleanup kobject_del [ 1898.849366][ T9005] kobject: 'tx-0' (000000003b606ffe): calling ktype release [ 1898.852055][ T1071] RSP: 002b:00007ffcea2a3da8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1898.857072][ T9005] kobject: 'tx-0': free name [ 1898.870753][ T9005] kobject: 'queues' (00000000e1536acb): kobject_cleanup, parent 000000002845de56 [ 1898.872052][ T1071] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004138a3 [ 1898.888387][ T1071] RDX: 0000000000000040 RSI: 0000000000a70070 RDI: 0000000000000003 [ 1898.891986][ T9005] kobject: 'queues' (00000000e1536acb): calling ktype release [ 1898.896816][ T1071] RBP: 00007ffcea2a3e10 R08: 00007ffcea2a3db0 R09: 000000000000000c [ 1898.911987][ T9005] kobject: 'queues' (00000000e1536acb): kset_release [ 1898.912068][ T1071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1898.918676][ T9005] kobject: 'queues': free name [ 1898.927576][ T1071] R13: 00000000004becb1 R14: 0000000000000000 R15: 0000000000000006 [ 1898.940169][ T1071] [ 1898.940169][ T1071] Showing all locks held in the system: [ 1898.950155][ T1071] 1 lock held by khungtaskd/1071: [ 1898.955418][ T9005] kobject: 'veth0_to_bond' (0000000027682a27): kobject_uevent_env [ 1898.955909][ T1071] #0: ffffffff88faaf80 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 1898.963486][ T9005] kobject: 'veth0_to_bond' (0000000027682a27): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1898.965405][ T9005] kobject: 'batman_adv' (00000000aad4d8d1): kobject_uevent_env [ 1898.974561][ T1071] 1 lock held by rsyslogd/8718: [ 1898.997453][ T1071] #0: ffff88809788b860 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 1899.006425][ T1071] 2 locks held by getty/8808: [ 1899.011097][ T1071] #0: ffff8880a23ecbd0 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1899.020518][ T9005] kobject: 'batman_adv' (00000000aad4d8d1): kobject_uevent_env: filter function caused the event to drop! [ 1899.033114][ T1071] #1: ffffc90005f112e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 1899.042889][ T9005] kobject: 'batman_adv' (00000000aad4d8d1): kobject_cleanup, parent 000000002845de56 [ 1899.052963][ T9005] kobject: 'batman_adv' (00000000aad4d8d1): calling ktype release [ 1899.060766][ T9005] kobject: (00000000aad4d8d1): dynamic_kobj_release [ 1899.062096][ T1071] 2 locks held by getty/8809: [ 1899.067479][ T9005] kobject: 'batman_adv': free name [ 1899.077429][ T9005] kobject: 'rx-0' (00000000fd6e6bf7): kobject_cleanup, parent 0000000076f16265 [ 1899.082006][ T1071] #0: ffff8880a16ed690 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1899.086533][ T9005] kobject: 'rx-0' (00000000fd6e6bf7): auto cleanup 'remove' event [ 1899.103216][ T9005] kobject: 'rx-0' (00000000fd6e6bf7): kobject_uevent_env [ 1899.110248][ T9005] kobject: 'rx-0' (00000000fd6e6bf7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1899.112138][ T1071] #1: ffffc90005f312e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 1899.121089][ T9005] kobject: 'rx-0' (00000000fd6e6bf7): auto cleanup kobject_del [ 1899.138270][ T9005] kobject: 'rx-0' (00000000fd6e6bf7): calling ktype release [ 1899.145643][ T9005] kobject: 'rx-0': free name [ 1899.145949][ T1071] 2 locks held by getty/8810: [ 1899.150298][ T9005] kobject: 'tx-0' (00000000634f343c): kobject_cleanup, parent 0000000076f16265 [ 1899.164026][ T9005] kobject: 'tx-0' (00000000634f343c): auto cleanup 'remove' event [ 1899.172128][ T1071] #0: ffff888092cb2510 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1899.172333][ T9005] kobject: 'tx-0' (00000000634f343c): kobject_uevent_env [ 1899.181324][ T1071] #1: ffffc90005f2d2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 1899.188407][ T9005] kobject: 'tx-0' (00000000634f343c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1899.208754][ T9005] kobject: 'tx-0' (00000000634f343c): auto cleanup kobject_del [ 1899.212117][ T1071] 2 locks held by getty/8811: [ 1899.216448][ T9005] kobject: 'tx-0' (00000000634f343c): calling ktype release [ 1899.221653][ T1071] #0: ffff888092cb3610 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1899.228765][ T9005] kobject: 'tx-0': free name [ 1899.242047][ T9005] kobject: 'queues' (0000000076f16265): kobject_cleanup, parent 000000002845de56 [ 1899.244286][ T1071] #1: ffffc90005f252e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 1899.251751][ T9005] kobject: 'queues' (0000000076f16265): calling ktype release [ 1899.261697][ T1071] 2 locks held by getty/8812: [ 1899.274502][ T1071] #0: ffff8880a0c24490 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1899.283821][ T1071] #1: ffffc90005f212e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 1899.292073][ T9005] kobject: 'queues' (0000000076f16265): kset_release [ 1899.293872][ T1071] 2 locks held by getty/8813: [ 1899.300067][ T9005] kobject: 'queues': free name [ 1899.305085][ T1071] #0: ffff888092cb2d90 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1899.319153][ T1071] #1: ffffc90005f292e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 1899.322777][ T9005] kobject: 'bridge_slave_1' (00000000ca108236): kobject_uevent_env [ 1899.329152][ T1071] 2 locks held by getty/8814: [ 1899.341868][ T1071] #0: ffff8880a16d6150 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1899.352039][ T1071] #1: ffffc90005f012e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 1899.352543][ T9005] kobject: 'bridge_slave_1' (00000000ca108236): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1899.361670][ T1071] 7 locks held by kworker/u4:5/9005: [ 1899.380700][ T1071] 3 locks held by kworker/1:4/12286: [ 1899.386835][ T1071] #0: ffff8880aa4278e8 ((wq_completion)events){+.+.}, at: process_one_work+0x88b/0x1740 [ 1899.394195][ T9005] kobject: 'batman_adv' (0000000089ea43ab): kobject_uevent_env [ 1899.397222][ T1071] #1: ffff88808134fdc0 ((linkwatch_work).work){+.+.}, at: process_one_work+0x8c1/0x1740 [ 1899.411998][ T9005] kobject: 'batman_adv' (0000000089ea43ab): kobject_uevent_env: filter function caused the event to drop! [ 1899.414584][ T1071] #2: ffffffff899a4320 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 1899.434121][ T1071] 3 locks held by kworker/1:27/22087: [ 1899.439522][ T1071] #0: ffff888216b54968 ((wq_completion)ipv6_addrconf){+.+.}, at: process_one_work+0x88b/0x1740 [ 1899.442058][ T9005] kobject: 'batman_adv' (0000000089ea43ab): kobject_cleanup, parent 000000002845de56 [ 1899.452031][ T1071] #1: ffff8880a1e7fdc0 ((work_completion)(&(&ifa->dad_work)->work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 1899.459759][ T9005] kobject: 'batman_adv' (0000000089ea43ab): calling ktype release [ 1899.479105][ T9005] kobject: (0000000089ea43ab): dynamic_kobj_release [ 1899.485767][ T1071] #2: ffffffff899a4320 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 1899.493860][ T9005] kobject: 'batman_adv': free name [ 1899.499190][ T9005] kobject: 'rx-0' (00000000e770e0b7): kobject_cleanup, parent 00000000e709c0a5 [ 1899.508217][ T1071] 3 locks held by kworker/0:3/22357: [ 1899.513535][ T1071] #0: ffff888216b54968 ((wq_completion)ipv6_addrconf){+.+.}, at: process_one_work+0x88b/0x1740 [ 1899.522097][ T9005] kobject: 'rx-0' (00000000e770e0b7): auto cleanup 'remove' event [ 1899.524010][ T1071] #1: ffff88809087fdc0 ((work_completion)(&(&ifa->dad_work)->work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 1899.532157][ T9005] kobject: 'rx-0' (00000000e770e0b7): kobject_uevent_env [ 1899.551529][ T9005] kobject: 'rx-0' (00000000e770e0b7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1899.551983][ T1071] #2: ffffffff899a4320 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 1899.562790][ T9005] kobject: 'rx-0' (00000000e770e0b7): auto cleanup kobject_del [ 1899.578321][ T9005] kobject: 'rx-0' (00000000e770e0b7): calling ktype release [ 1899.581999][ T1071] 3 locks held by kworker/0:5/22358: [ 1899.590885][ T1071] #0: ffff8880aa4278e8 ((wq_completion)events){+.+.}, at: process_one_work+0x88b/0x1740 [ 1899.601074][ T9005] kobject: 'rx-0': free name [ 1899.601158][ T9005] kobject: 'tx-0' (00000000d4ebc2ba): kobject_cleanup, parent 00000000e709c0a5 [ 1899.601167][ T9005] kobject: 'tx-0' (00000000d4ebc2ba): auto cleanup 'remove' event [ 1899.601178][ T9005] kobject: 'tx-0' (00000000d4ebc2ba): kobject_uevent_env [ 1899.601189][ T9005] kobject: 'tx-0' (00000000d4ebc2ba): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1899.601197][ T9005] kobject: 'tx-0' (00000000d4ebc2ba): auto cleanup kobject_del [ 1899.601258][ T9005] kobject: 'tx-0' (00000000d4ebc2ba): calling ktype release [ 1899.601264][ T9005] kobject: 'tx-0': free name [ 1899.601289][ T9005] kobject: 'queues' (00000000e709c0a5): kobject_cleanup, parent 000000002845de56 [ 1899.601297][ T9005] kobject: 'queues' (00000000e709c0a5): calling ktype release [ 1899.601310][ T9005] kobject: 'queues' (00000000e709c0a5): kset_release [ 1899.606759][ T1071] #1: ffff8880a1b9fdc0 (deferred_process_work){+.+.}, at: process_one_work+0x8c1/0x1740 [ 1899.615692][ T9005] kobject: 'queues': free name [ 1899.631985][ T1071] #2: ffffffff899a4320 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 1899.642556][ T9005] kobject: 'veth1_to_bridge' (00000000f63ddb6f): kobject_uevent_env [ 1899.702097][ T1071] 1 lock held by syz-executor.5/23341: [ 1899.706847][ T9005] kobject: 'veth1_to_bridge' (00000000f63ddb6f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1899.721981][ T1071] #0: ffffffff899a4320 (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x40a/0xb00 [ 1899.740639][ T1071] [ 1899.743976][ T1071] ============================================= [ 1899.743976][ T1071] [ 1899.752543][ T1071] NMI backtrace for cpu 1 [ 1899.754368][ T9005] kobject: 'batman_adv' (000000003af89cb2): kobject_uevent_env [ 1899.756879][ T1071] CPU: 1 PID: 1071 Comm: khungtaskd Not tainted 5.4.0-rc1+ #0 [ 1899.771929][ T1071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1899.781987][ T1071] Call Trace: [ 1899.782072][ T9005] kobject: 'batman_adv' (000000003af89cb2): kobject_uevent_env: filter function caused the event to drop! [ 1899.785307][ T1071] dump_stack+0x172/0x1f0 [ 1899.800932][ T1071] nmi_cpu_backtrace.cold+0x70/0xb2 [ 1899.806136][ T1071] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1899.812110][ T9005] kobject: 'batman_adv' (000000003af89cb2): kobject_cleanup, parent 000000002845de56 [ 1899.812376][ T1071] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 1899.821806][ T9005] kobject: 'batman_adv' (000000003af89cb2): calling ktype release [ 1899.827420][ T1071] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 1899.827438][ T1071] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1899.827449][ T1071] watchdog+0x9d0/0xef0 [ 1899.827471][ T1071] kthread+0x361/0x430 [ 1899.827484][ T1071] ? reset_hung_task_detector+0x30/0x30 [ 1899.827498][ T1071] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1899.827515][ T1071] ret_from_fork+0x24/0x30 [ 1899.827715][ T1071] Sending NMI from CPU 1 to CPUs 0: [ 1899.862092][ T9005] kobject: (000000003af89cb2): dynamic_kobj_release [ 1899.868442][ T1071] NMI backtrace for cpu 0 [ 1899.868448][ T1071] CPU: 0 PID: 9005 Comm: kworker/u4:5 Not tainted 5.4.0-rc1+ #0 [ 1899.868455][ T1071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1899.868459][ T1071] Workqueue: netns cleanup_net [ 1899.868466][ T1071] RIP: 0010:io_serial_out+0x73/0x90 [ 1899.868478][ T1071] Code: 00 49 8d 7c 24 38 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 d3 e3 80 3c 02 00 75 19 41 03 5c 24 38 44 89 e8 89 da ee <5b> 41 5c 41 5d 5d c3 e8 91 34 1e fe eb c0 e8 ea 34 1e fe eb e0 0f [ 1899.868482][ T1071] RSP: 0018:ffff88806963f488 EFLAGS: 00000006 [ 1899.868490][ T1071] RAX: 0000000000000000 RBX: 00000000000003f9 RCX: 0000000000000000 [ 1899.868496][ T1071] RDX: 00000000000003f9 RSI: ffffffff83908a06 RDI: ffffffff8b581ab8 [ 1899.868501][ T1071] RBP: ffff88806963f4a0 R08: ffff88806962c040 R09: ffffed100d2c7e83 [ 1899.868507][ T1071] R10: ffffed100d2c7e82 R11: 0000000000000003 R12: ffffffff8b581a80 [ 1899.868512][ T1071] R13: 0000000000000000 R14: ffffffff8b581ac8 R15: ffff88806963f590 [ 1899.868518][ T1071] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1899.868523][ T1071] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1899.868529][ T1071] CR2: 00007f20f40211a8 CR3: 000000008e9bc000 CR4: 00000000001406f0 [ 1899.868534][ T1071] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1899.868540][ T1071] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1899.868543][ T1071] Call Trace: [ 1899.868547][ T1071] serial8250_console_write+0x314/0x9a0 [ 1899.868552][ T1071] ? serial8250_em485_handle_start_tx+0x470/0x470 [ 1899.868556][ T1071] ? lock_acquire+0x190/0x410 [ 1899.868560][ T1071] ? console_unlock+0x415/0xf10 [ 1899.868564][ T1071] univ8250_console_write+0x5f/0x70 [ 1899.868568][ T1071] ? univ8250_console_setup+0x160/0x160 [ 1899.868572][ T1071] console_unlock+0xb89/0xf10 [ 1899.868576][ T1071] vprintk_emit+0x2a0/0x700 [ 1899.868579][ T1071] vprintk_default+0x28/0x30 [ 1899.868583][ T1071] vprintk_func+0x7e/0x189 [ 1899.868586][ T1071] printk+0xba/0xed [ 1899.868591][ T1071] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1899.868595][ T1071] dynamic_kobj_release+0x24/0x30 [ 1899.868599][ T1071] kobject_put.cold+0x289/0x2e6 [ 1899.868603][ T1071] batadv_sysfs_del_hardif+0x6f/0xb8 [ 1899.868607][ T1071] batadv_hardif_remove_interface+0x7d/0x170 [ 1899.868611][ T1071] batadv_hard_if_event+0x2cb/0xf80 [ 1899.868616][ T1071] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1899.868620][ T1071] notifier_call_chain+0xc2/0x230 [ 1899.868624][ T1071] raw_notifier_call_chain+0x2e/0x40 [ 1899.868628][ T1071] call_netdevice_notifiers_info+0xba/0x130 [ 1899.868632][ T1071] ? veth_disable_xdp+0x7f0/0x7f0 [ 1899.868637][ T1071] rollback_registered_many+0x850/0x10d0 [ 1899.868641][ T1071] ? generic_xdp_install+0x4a0/0x4a0 [ 1899.868644][ T1071] ? __kasan_check_read+0x11/0x20 [ 1899.868649][ T1071] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1899.868653][ T1071] ? __kasan_check_read+0x11/0x20 [ 1899.868658][ T1071] unregister_netdevice_many.part.0+0x1b/0x1f0 [ 1899.868662][ T1071] default_device_exit_batch+0x34e/0x410 [ 1899.868666][ T1071] ? unregister_netdevice_many+0x50/0x50 [ 1899.868670][ T1071] ? default_device_exit+0x24f/0x2f0 [ 1899.868675][ T1071] ? prepare_to_wait_exclusive+0x320/0x320 [ 1899.868679][ T1071] ? rtnl_unlock+0xe/0x10 [ 1899.868683][ T1071] ? unregister_netdevice_many+0x50/0x50 [ 1899.868687][ T1071] ? dev_change_net_namespace+0xca0/0xca0 [ 1899.868691][ T1071] ops_exit_list.isra.0+0xfc/0x150 [ 1899.868695][ T1071] cleanup_net+0x4e2/0xa60 [ 1899.868699][ T1071] ? netns_install+0x1d0/0x1d0 [ 1899.868708][ T1071] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1899.868713][ T1071] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1899.868717][ T1071] ? trace_hardirqs_on+0x67/0x240 [ 1899.868721][ T1071] process_one_work+0x9af/0x1740 [ 1899.868725][ T1071] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1899.868729][ T1071] ? lock_acquire+0x190/0x410 [ 1899.868733][ T1071] worker_thread+0x98/0xe40 [ 1899.868737][ T1071] ? trace_hardirqs_on+0x67/0x240 [ 1899.868740][ T1071] kthread+0x361/0x430 [ 1899.868744][ T1071] ? process_one_work+0x1740/0x1740 [ 1899.868749][ T1071] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1899.868753][ T1071] ret_from_fork+0x24/0x30 [ 1899.868950][ T1071] Kernel panic - not syncing: hung_task: blocked tasks [ 1899.892877][ T9005] kobject: 'batman_adv': free name [ 1899.896365][ T1071] CPU: 1 PID: 1071 Comm: khungtaskd Not tainted 5.4.0-rc1+ #0 [ 1899.907132][ T9005] kobject: 'rx-0' (00000000d9d40739): kobject_cleanup, parent 00000000bfa9e13e [ 1899.911152][ T1071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1899.932065][ T9005] kobject: 'rx-0' (00000000d9d40739): auto cleanup 'remove' event [ 1899.935930][ T1071] Call Trace: [ 1899.952042][ T9005] kobject: 'rx-0' (00000000d9d40739): kobject_uevent_env [ 1899.958172][ T1071] dump_stack+0x172/0x1f0 [ 1899.982608][ T9005] kobject: 'rx-0' (00000000d9d40739): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1899.991178][ T1071] panic+0x2dc/0x755 [ 1900.012037][ T9005] kobject: 'rx-0' (00000000d9d40739): auto cleanup kobject_del [ 1900.013688][ T1071] ? add_taint.cold+0x16/0x16 [ 1900.021693][ T9005] kobject: 'rx-0' (00000000d9d40739): calling ktype release [ 1900.024916][ T1071] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 1900.024934][ T1071] ? ___preempt_schedule+0x16/0x20 [ 1900.024952][ T1071] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 1900.024966][ T1071] ? nmi_trigger_cpumask_backtrace+0x24c/0x28b [ 1900.024978][ T1071] ? nmi_trigger_cpumask_backtrace+0x256/0x28b [ 1900.024992][ T1071] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 1900.025009][ T1071] watchdog+0x9e1/0xef0 [ 1900.025033][ T1071] kthread+0x361/0x430 [ 1900.025046][ T1071] ? reset_hung_task_detector+0x30/0x30 [ 1900.025060][ T1071] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1900.025075][ T1071] ret_from_fork+0x24/0x30 [ 1900.032155][ T1071] Kernel Offset: disabled [ 1900.444958][ T1071] Rebooting in 86400 seconds..